forecasting-reverso
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/load_checkpoint.pycontains a customTorchUnpicklerclass used to load model weights. This class inherits frompickle.Unpicklerand includes a fallback to the standardfind_classmethod. Sincepickleis inherently unsafe, this allows for arbitrary code execution if a maliciously crafted checkpoint file is processed. The skill specifically instructs the agent to load these files from a remote URL or user uploads. - [EXTERNAL_DOWNLOADS]: The skill (in
SKILL.mdandscripts/reverso.py) downloads binary model checkpoints from a third-party repository on HuggingFace (https://huggingface.co/shinfxh/reverso/). The author of this repository is not a recognized trusted vendor, and the downloaded binary data is processed using the insecure deserialization logic mentioned above. - [COMMAND_EXECUTION]: The setup instructions in
SKILL.mdperform a system-level installation usinguv pip install numba --system --break-system-packages. Using the--break-system-packagesflag bypasses standard Python environment protections and can lead to system instability or conflicts.
Recommendations
- AI detected serious security threats
Audit Metadata