pytorch-lightning
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill instructs the agent to install the
lightningpackage viapip install lightning. This package is not from a predefined trusted source organization, and the lack of version pinning increases the risk of supply chain attacks. - Indirect Prompt Injection (MEDIUM): The skill defines a training workflow that processes external datasets, which constitutes a significant attack surface. 1. Ingestion points: Data enters the context through
DataLoaderobjects and thetrain_loadervariable. 2. Boundary markers: Absent; there are no instructions to the agent to distinguish between data and control instructions in processed inputs. 3. Capability inventory: TheL.TrainerandModelCheckpointcomponents perform filesystem writes and manage subprocesses. 4. Sanitization: Absent; input data is processed directly without validation. - Dynamic Execution (MEDIUM): The use of
ModelCheckpointrelies ontorch.save, which typically uses thepicklemodule for serialization. Loading checkpoints from untrusted sources can lead to arbitrary code execution.
Audit Metadata