forecasting-reverso
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
load_checkpoint.pyscript utilize thepicklemodule to deserialize model weight files. Thepickleformat is inherently insecure as it allows for arbitrary code execution during the unpickling process. Although a customTorchUnpickleris implemented, itsfind_classmethod includes a fallback to the default implementation, which does not prevent the loading of dangerous modules. This risk is particularly relevant as the skill's instructions suggest user-uploaded files as a fallback for obtaining model weights. - [COMMAND_EXECUTION]: The setup instructions in
SKILL.mdinvolve executing shell commands to install thenumbapackage and move scripts into the home directory. The use of the--break-system-packagesflag withpipindicates a system-level installation that can bypass safety checks and potentially destabilize the container environment. - [EXTERNAL_DOWNLOADS]: The skill is designed to download model weight artifacts from HuggingFace (
huggingface.co). While this is a well-known service, fetching and processing external binary files (especially those using thepickleformat) introduces a significant dependency risk and a potential vector for supply chain attacks.
Audit Metadata