alphaear-predictor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill utilizes
torch.loadinscripts/kronos_predictor.pyandscripts/utils/predictor/evaluation.pyto load model weights. Sincetorch.loadrelies on the Pythonpicklemodule, it is inherently vulnerable to arbitrary code execution. This risk is critical here because the skill is designed to load models from unverified external sources. - [EXTERNAL_DOWNLOADS] (HIGH): In
scripts/kronos_predictor.pyandscripts/utils/predictor/kline_generate.py, the skill downloads models and tokenizers from theNeoQuasarrepository on HuggingFace (NeoQuasar/Kronos-base). This repository is not part of the trusted organization list, and downloading executable-adjacent artifacts (weights) from untrusted sources is a major security risk. - [PROMPT_INJECTION] (MEDIUM): The skill implements an indirect prompt injection surface in
scripts/prompts/forecast_analyst.py. External market news (news_context) is interpolated directly into the system prompt for the analyst agent. There are no boundary markers or sanitization logic to prevent malicious news content from hijacking the agent's logic to manipulate financial forecasts. - [COMMAND_EXECUTION] (LOW):
scripts/utils/predictor/evaluation.pyusesexecute_queryto interact with a local SQLite database. While the specific query shown is a simpleSELECT, the presence of direct database interaction capability increases the potential impact of other vulnerabilities.
Recommendations
- AI detected serious security threats
Audit Metadata