bulk-rna-seq-batch-correction-with-combat
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs the user to load data using
pd.read_pickle()in bothSKILL.md(Instruction 2) andreference.md. This function is inherently insecure as it utilizes the Pythonpicklemodule for deserialization, which can be exploited to execute arbitrary code if a maliciously crafted file is provided as input. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its data ingestion patterns.
- Ingestion points: Files are loaded via
pd.read_pickleandpd.read_csvinSKILL.mdandreference.md. - Boundary markers: None identified; there are no instructions to ignore embedded commands in the input data.
- Capability inventory: The skill has the capability to execute code via
pickleand performs file write operations (to_csv,write_h5ad) inreference.md. - Sanitization: No validation or sanitization of the input data structure or content is performed before processing.
Audit Metadata