hugging-face-model-trainer

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). The list mixes legitimate Hugging Face and GitHub documentation (low risk) with direct raw-script URLs and user-controlled Hub/Gist/raw.githubusercontent links that deliver executable code and can be trivially used to distribute malicious payloads if unvetted, so overall this is a moderate‑to‑high risk when used to auto-download/execute.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The content contains high-risk remote code execution and supply-chain patterns (use of trust_remote_code=True, cloning and executing code from external repos, installing remote requirements and building binaries) that could allow arbitrary code execution or credential exfiltration in a jobs environment.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and runs public, user-provided content (e.g., inspecting arbitrary Hugging Face datasets via the Dataset Inspector which queries the Datasets Server API, and accepting scripts from public URLs on Hugging Face, GitHub, or Gists for hf_jobs), so the agent will read and act on untrusted third‑party/user‑generated content.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:27 AM