kaggle
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- Persistence Mechanisms (MEDIUM): The
modules/badge-collector/scripts/phase_5_streaks.pyscript generates a bash script (daily_streak.sh) and provides the user with platform-specific instructions to install it as a scheduled task usingcron(Linux) orlaunchd(macOS). While the installation requires manual user intervention, this design is intended to maintain long-term, automated activity on the Kaggle platform. - Dynamic Execution (MEDIUM): The skill employs several dynamic execution patterns to facilitate its modularity and automation goals:
modules/badge-collector/scripts/orchestrator.pyuses the__import__function to dynamically load phase-specific logic based on runtime arguments.modules/badge-collector/scripts/phase_5_streaks.pyprogrammatically assembles and writes a shell script to the disk for later execution.- Multiple scripts use
subprocess.runto execute dynamically constructed CLI commands for thekaggletool. - Indirect Prompt Injection (LOW): The
modules/comp-report/module facilitates a workflow that ingests untrusted data from an external source. - Ingestion points: Competition overview pages, evaluation metrics, and solution writeup links are scraped from
https://www.kaggle.comusing Playwright tools. - Boundary markers: Scraped content is interpolated into Markdown reports. There are no explicit boundary markers or instructions to the agent to ignore potentially malicious content embedded in competition titles or descriptions.
- Capability inventory: The skill possesses significant capabilities, including network access, file system modification, and the ability to execute code on the Kaggle Kernel Backend (KKB).
- Sanitization: No explicit sanitization or validation of the scraped HTML/text content was found before it is included in the generated reports.
- Remote Code Execution (SAFE): The skill facilitates remote code execution via
kaggle kernels push. This is a standard feature of the Kaggle platform (KKB) and is used here as intended to execute data science notebooks in a sandboxed environment. - Credential Management (SAFE): The registration and credential-checking modules (
modules/registration/,shared/check_all_credentials.py) follow security best practices. They usechmod 600to secure the~/.kaggle/kaggle.jsonfile and implement masking to ensure that API keys are never printed in plain text to the console or logs.
Audit Metadata