esm
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The reference documentation and workflow examples include Python code snippets for caching protein embeddings and checkpointing batch processing jobs that utilize the
picklemodule. - Evidence: In
references/esm-c-api.md,references/forge-api.md, andreferences/workflows.md, classes such asEmbeddingCache,CheckpointedBatchProcessor, andForgeCacheusepickle.load()to deserialize data from local storage. - Risk: The
picklemodule is inherently unsafe for processing untrusted data; loading a malicious pickle file can lead to arbitrary code execution on the host system. - [COMMAND_EXECUTION]: The skill provides instructions for installing the toolkit and high-performance dependencies via the shell.
- Evidence:
SKILL.mdcontains installation commandsuv pip install esmanduv pip install flash-attn. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the ingestion of external protein structure (PDB) files.
- Ingestion points:
SKILL.mdandreferences/esm3-api.mddocument the use ofESMProtein.from_pdb()to load data from external files. - Boundary markers: There are no delimiters or instructions provided to the agent to treat the content of loaded PDB files as non-instructional data.
- Capability inventory: The skill has the capability to execute shell commands (
pip), perform network operations via the Forge API, and write files to the local system (to_pdb). - Sanitization: No sanitization or validation of the input file content is mentioned in the provided examples or documentation.
Audit Metadata