runpod-deployment
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Multiple code templates for model loading (e.g., in
templates/runpod-worker.pyandreference/model-deployment.md) use thetrust_remote_code=Trueparameter. This allows the execution of arbitrary Python code included in the model's remote repository on Hugging Face. - [EXTERNAL_DOWNLOADS]: The CI/CD instructions in
reference/cicd.mddownload therunpodctlbinary from RunPod's official GitHub releases during the deployment process. - [COMMAND_EXECUTION]: Shell scripts within the documentation use
sudoto install therunpodctlCLI tool and execute deployment commands as part of the GitHub Actions workflow. - [CREDENTIALS_UNSAFE]: The skill requires sensitive credentials such as
RUNPOD_API_KEYandHF_TOKENto be provided as environment variables or GitHub Secrets for authentication with external services. - [PROMPT_INJECTION]: The LLM handler patterns process user-supplied
promptandmessagesdata. While the skill employs Pydantic for input validation, it lacks specific sanitization layers or boundary markers to mitigate indirect prompt injection or jailbreak attempts within the processed data.
Audit Metadata