admet-prediction
Warn
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python script
examples/basic_example.pyuseseval()to process model output from theEnsemblePipeline. This allows for arbitrary code execution if the string returned by the model is compromised. - [COMMAND_EXECUTION]: The documentation file
references/sider_categories.mdcontains a code example that utilizeseval()to parse side-effect probabilities, encouraging insecure implementation patterns. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted SMILES strings which are used as input for models whose output is directly evaluated. 1. Ingestion points: SMILES strings in
predict_admet(examples/basic_example.py). 2. Boundary markers: None present. 3. Capability inventory: Use ofeval()inexamples/basic_example.py. 4. Sanitization: Model outputs are not sanitized or validated before evaluation.
Audit Metadata