model-deployment
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill instructs the user to execute a remote script using
curl -fsSL https://ollama.ai/install.sh | sh. - Evidence: Found in the 'Ollama (Local Deployment)' section of
SKILL.md. - Reasoning: Executing piped web content is a significant security risk as the source (ollama.ai) is not within the defined trusted organization scope and the content could be modified to execute malicious code on the host system.
- COMMAND_EXECUTION (MEDIUM): The skill provides multiple instructions for running arbitrary commands and services with high privileges.
- Evidence:
docker run --gpus allandpython -m vllm.entrypoints.openai.api_server. - Context: These are necessary for the skill's primary purpose of model deployment, but they involve running external images and starting network-accessible servers.
- INDIRECT_PROMPT_INJECTION (LOW): The FastAPI implementation creates a surface for indirect prompt injection.
- Ingestion points: The
GenerateRequest.promptfield in the FastAPI server (file:SKILL.md). - Boundary markers: None present in the code; the prompt is passed directly to the tokenizer.
- Capability inventory: The model generates text based on the input, which can be used to influence downstream agent behavior if the output is processed further.
- Sanitization: No input validation or sanitization is performed on the
promptstring before inference.
Recommendations
- HIGH: Downloads and executes remote code from: https://ollama.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata