computer-vision
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (LOW): The skill uses automated functions to download pre-trained machine learning models at runtime.
- Evidence:
SKILL.mdcontainstorch.hub.load('pytorch/vision:v0.10.0', ...)andYOLO('yolov8n.pt')which fetch model weights and scripts from external servers. - Context: The downloads originate from trusted organizations (PyTorch and Ultralytics). Per the [TRUST-SCOPE-RULE], these findings are downgraded to LOW.
- REMOTE_CODE_EXECUTION (LOW): The
torch.hub.loadfunction dynamically executes a configuration script from a remote GitHub repository. - Evidence: Found in
SKILL.mdline 147:model = torch.hub.load('pytorch/vision:v0.10.0', ...). - Context: This is a standard but technically dynamic execution pattern. It is considered low risk because it targets a verified repository from a trusted organization (pytorch).
- FALSE POSITIVE (SAFE): The automated scan alert for the URL 'box.co' was investigated and determined to be an error.
- Evidence: Analysis of the code reveals no malicious links. The scanner likely misidentified the Python variable access
box.conf(representing 'bounding box confidence' inSKILL.md) as the shortened URL 'box.co'.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata