run-train
Warn
Audited by Socket on Apr 4, 2026
1 alert found:
AnomalyAnomalyscripts/write_outputs.py
LOWAnomalyLOW
scripts/write_outputs.py
This fragment is a thin dynamic module loader that executes write_run_bundle.py from a computed relative filesystem location and then calls its main() with training defaults. No direct malicious behavior is evident in the fragment, but the use of spec.loader.exec_module without integrity/allowlist validation creates a meaningful supply-chain/sideloading risk if the target file can be tampered with. Review and verify the contents and provenance of shared/scripts/write_run_bundle.py and ensure build/distribution processes prevent replacement.
Confidence: 60%Severity: 55%
Audit Metadata