cuda-kernels
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for privilege escalation by using sudo to modify critical system configuration files. Evidence: 'sudo sh -c 'echo "options nvidia NVreg_RestrictProfilingToAdminUsers=0" > /etc/modprobe.d/ncu-permissions.conf'' in REFERENCE.md.
- [COMMAND_EXECUTION]: The skill recommends executing profiling tools with elevated privileges. Evidence: 'sudo ncu -k "kernel_regex" -c 5 ./app [args]' in REFERENCE.md.
- [COMMAND_EXECUTION]: The skill relies on the execution of local shell scripts and compilation tools for its development lifecycle. Evidence: './scripts/test-kernel.sh', './scripts/count-kernels.sh', and 'nvcc' in SKILL.md.
- [COMMAND_EXECUTION]: The skill implements dynamic loading of GPU kernel code at runtime. Evidence: 'dev.get_or_load_func("my_kernel_name", PTX_SRC)' in SKILL.md.
- [COMMAND_EXECUTION]: Indirect Prompt Injection risk surface identified. Ingestion points: Processing of CUDA source files (.cu) in kernels/ and SQLite profile exports. Capability inventory: High-privilege command execution (sudo), code compilation (nvcc), and runtime loading of PTX kernels. Boundary markers: Absent. Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata