sglang-jax-skypilot-dev
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/launch_tpu.shscript performs dynamic template rendering, which can lead to unintended command or configuration injection. - Evidence: The script uses
sedto inject the$ACCELERATORand$NAMEshell variables into thetpu_resource.sky.yamltemplate. While$NAMEis sanitized,$ACCELERATORis used without validation, potentially allowing YAML structure injection if malicious strings containing newlines or YAML syntax are provided. - Evidence: The resulting rendered file is directly executed via
sky launch "$TEMP_YAML". - [COMMAND_EXECUTION]: The skill documentation provides the agent with the ability to execute a wide range of shell commands on both the local machine and remote TPU clusters.
- Evidence: Commands include
sky exec,ssh,rsync, and complextmuxsession management (tmux send-keys) which provide high-privilege access to remote infrastructure. - [DATA_EXFILTRATION]: The skill requires access to sensitive local files for authentication and data transfer.
- Evidence:
SKILL.mdinstructs the agent to access the SSH private key at~/.ssh/sky-keyfor cluster connectivity andrsyncoperations. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection due to its reliance on processing remote execution output.
- Evidence: Ingestion points: The agent is instructed to read remote status via
sky statusand capture live server/client logs usingtmux capture-pane. - Evidence: Boundary markers: No delimiters or instructions to ignore embedded commands within logs are provided in the prompt templates.
- Evidence: Capability inventory: The agent has the capability to run subprocesses (
sky), write to the local filesystem (.cluster_name_tpu), and manage remote sessions via SSH. - Evidence: Sanitization: There is no evidence of sanitization or filtering applied to the remote output before it is processed by the agent.
Audit Metadata