modal-sandbox
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is primarily designed to execute shell commands and scripts within isolated Modal Sandbox containers using the official
modalSDK, as demonstrated inscripts/smoke_test.py.- [REMOTE_CODE_EXECUTION]: It facilitates the execution of user-supplied code on remote Modal infrastructure. All remote interactions are conducted through the authenticated Modal SDK, which is a well-known cloud service.- [EXTERNAL_DOWNLOADS]: The skill requires and references themodalPython package. These dependencies are standard for interacting with the Modal platform and do not involve untrusted third-party script execution.- [PROMPT_INJECTION]: While the skill processes user-supplied code, it relies on the isolation of the sandbox environment to mitigate risks. There are no patterns suggesting attempts to bypass the agent's core safety guidelines. - Ingestion points: User-provided commands and scripts are passed to
modal.Sandbox.createandsandbox.execinSKILL.mdandevals/evals.json. - Boundary markers: Instructions emphasize the use of isolated sandboxes for "untrusted or user-supplied code" to maintain environment security.
- Capability inventory: The skill provides full execution capabilities within the container, including filesystem access (
sandbox.open) and network tunnels (sandbox.tunnels) as documented in the reference files. - Sanitization: The skill does not perform string sanitization, instead relying on the infrastructure-level isolation of the Modal Sandbox container.
Audit Metadata