nmr-prediction

Warn

Audited by Socket on Mar 30, 2026

5 alerts found:

Anomalyx2Securityx3
AnomalyLOW
assets/NMRNet/uninmr/tasks/unimat_rcut.py

Overall, the fragment is a dataset/task pipeline for ML training with no visible networking/backdoor/exfiltration behavior. However, it contains a significant supply-chain security risk: it uses unsafe pickle.load on a file path derived from runtime arguments (${args.data}/${split}_counter.pkl). If that artifact is tampered with or untrusted, it can lead to arbitrary code execution during training setup. Additionally, build_model appears broken due to returning an undefined variable (`mode`).

Confidence: 66%Severity: 66%
AnomalyLOW
nmr_prediction.py

No overt malicious payload logic (e.g., exfiltration or command execution) is visible in this module. However, the code performs security-sensitive supply-chain and deserialization operations: it downloads unverified model artifacts from a remote URL, writes them to `/tmp/weights/...`, and then loads a `.pt` checkpoint via a checkpoint loader (potentially pickle/unsafe deserialization). It also injects `assets/NMRNet` into `sys.path`, expanding the import-code execution surface if that directory is compromised. Treat this dependency/script as security-sensitive and harden with artifact integrity verification, trusted/non-tamperable storage, and safer checkpoint loading practices.

Confidence: 62%Severity: 65%
SecurityMEDIUM
assets/NMRNet/uninmr/utils/get_result.py

This module is a local evaluation/plotting utility, but it has a significant supply-chain security weakness: it deserializes arbitrary .pkl files from a user-specified directory using pickle.load without validation. If those .pkl files (or related dictionary inputs) are attacker-controlled or tampered with, the script can be used for arbitrary code execution during deserialization. Aside from this, there are no clear signs of overt malicious behavior (no networking or process spawning) in the provided fragment.

Confidence: 80%Severity: 78%
SecurityMEDIUM
assets/Uni-Core/unicore/utils.py

No clear indicators of malware such as exfiltration, cryptomining, or persistence are present in the provided fragment. However, the code contains high-severity arbitrary code execution mechanisms: it uses `eval()` on string inputs and performs dynamic module importing from a user-provided directory by mutating `sys.path` and calling `importlib.import_module`. If any of the relevant inputs (`x`, `args.user_dir`, or `functions`) can be attacker-influenced, this can enable supply-chain/plugin abuse and full RCE.

Confidence: 74%Severity: 86%
SecurityMEDIUM
assets/Uni-Core/unicore/distributed/utils.py

No overt backdoor/exfiltration behavior is visible in this fragment. The dominant security concern is unsafe cross-rank deserialization: it unpickles data received/reconstructed from other workers via pickle.loads, and it deserializes arbitrary broadcast objects using torch.load(..., weights_only=False). If any distributed participant or communicated payload can be influenced by an attacker (insider, compromised node, poisoned job), this can enable arbitrary code execution. Additional minor anomalies include reliance on external scontrol output for SLURM hostname discovery and a likely typo in _put_tensors_in_obj (undefined variable in one branch).

Confidence: 72%Severity: 82%
Audit Metadata
Analyzed At
Mar 30, 2026, 01:00 AM
Package URL
pkg:socket/skills-sh/InternScience%2FChemClaw%2Fnmr-prediction%2F@86ba1b44bfe00206f6fc6f591c4616cc225ac325