onnx-webgpu-converter
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
scripts/preflight_check.pyscript is vulnerable to Python code injection. It uses f-string interpolation to construct code for thepython -ccommand (e.g., incheck_onnx_communityanddetect_task). Because the inputmodel_idis not properly sanitized, an attacker can supply a crafted model ID (e.g.,\"); import os; os.system(\"id\") #) to execute arbitrary commands on the host machine.\n- [REMOTE_CODE_EXECUTION] (HIGH): The documentation inSKILL.mdrecommends using the--trust-remote-codeflag as a quick fix for conversion errors. This flag permits thetransformersandoptimumlibraries to download and execute arbitrary Python files provided by the model author on the Hugging Face Hub, posing a severe risk if the model source is malicious.\n- [EXTERNAL_DOWNLOADS] (LOW): The skill frequently references and downloads assets from the Hugging Face Hub. While this is part of its core functionality, it relies on the security and integrity of third-party model repositories which are not within the defined trust scope.\n- [DATA_EXFILTRATION] (LOW): The script makes network requests tohuggingface.coto retrieve model metadata. While Hugging Face is a legitimate service, the script lacks controls over where data is sent if the model ID is manipulated.
Recommendations
- AI detected serious security threats
Audit Metadata