kaggle
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill manages Kaggle API credentials (username, legacy key, and scoped tokens). It provides tools to generate these keys and save them to
~/.kaggle/kaggle.jsonand.envfiles. - Evidence:
modules/registration/scripts/setup_env.shandmodules/kllm/scripts/setup_env.shcreate thekaggle.jsonfile with user credentials. - [COMMAND_EXECUTION]: The skill makes extensive use of the
kagglecommand-line interface and thesubprocessmodule to interact with the Kaggle platform, including downloading data, submitting predictions, and pushing notebooks. - Evidence:
modules/badge-collector/scripts/utils.pycontains therun_kaggle_clifunction which wrapssubprocess.runto execute Kaggle commands. - [PROMPT_INJECTION]: The competition reporting module scrapes user-generated content from Kaggle, such as competition problem statements and winner writeups, which could contain indirect prompt injection attacks.
- Evidence:
modules/comp-report/README.mddescribes a workflow that uses Playwright to extract content from competition overview and leaderboard pages, including solution descriptions from user-submitted writeups. - [COMMAND_EXECUTION]: The badge collector module includes a persistence mechanism for earning streak badges by generating a shell script and providing instructions for manual scheduling via
cronorlaunchd. - Evidence:
modules/badge-collector/scripts/phase_5_streaks.pygeneratesdaily_streak.shand prints setup instructions for periodic execution.
Audit Metadata