ms-spectra-simulation
Warn
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
assets/fiora/fiora/GNN/FioraModel.pycontains aloadclass method that usesdill.load()to deserialize model data. Thedillmodule is inherently insecure as it can execute arbitrary Python code embedded in the serialized object. While the skill's standard prediction script uses a safer loading method, the presence of this vulnerability in the library poses a risk if an agent is directed to load an untrusted model file. - [COMMAND_EXECUTION]: Several components in the
assets/fiora/scripts/directory, such aspredict-single-smiles.py, utilizesubprocess.run()to execute other internal utilities. Furthermore, the main automation scriptms_spectra_simulation.pyuses the--output-stemargument to construct file paths (e.g.,/tmp/chemclaw/{args.output_stem}.msp) without sanitizing for directory traversal characters like../. This could allow a malicious actor to influence the agent to write or overwrite files outside of the intended temporary directory. - [EXTERNAL_DOWNLOADS]: The script
ms_spectra_simulation.pyuses the Playwright library to perform browser automation, interacting with the fioRa web application athttps://apps.bam.de/shn01/fioRa/. This application is hosted by the Bundesanstalt für Materialforschung und -prüfung (BAM), which is a trusted German federal institute. This interaction is consistent with the skill's primary scientific purpose.
Audit Metadata