run-train
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_training.pyutilizessubprocess.runto execute commands provided via the--commandargument. While this is central to the skill's functionality, it allows the agent to execute arbitrary shell commands within the host environment. - [DYNAMIC_EXECUTION]: The script
scripts/write_outputs.pyusesimportlib.utilto dynamically load and execute a Python module from a computed relative path:../../../shared/scripts/write_run_bundle.py. Loading code from outside the skill's local directory structure at runtime is a high-risk pattern as it depends on external files that are not part of the analyzed bundle. - [DATA_EXPOSURE]: The execution logic in
scripts/run_training.pycaptures allstdoutandstderrfrom the training process and writes it totrain_outputs/LOG.md. If the training command or environment variables leak sensitive data (such as API keys or paths) to the console, this information will be persisted and potentially processed by the agent.
Audit Metadata