cuda-kernels

Fail

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides instructions for privilege escalation by using sudo to modify critical system configuration files. Evidence: 'sudo sh -c 'echo "options nvidia NVreg_RestrictProfilingToAdminUsers=0" > /etc/modprobe.d/ncu-permissions.conf'' in REFERENCE.md.
  • [COMMAND_EXECUTION]: The skill recommends executing profiling tools with elevated privileges. Evidence: 'sudo ncu -k "kernel_regex" -c 5 ./app [args]' in REFERENCE.md.
  • [COMMAND_EXECUTION]: The skill relies on the execution of local shell scripts and compilation tools for its development lifecycle. Evidence: './scripts/test-kernel.sh', './scripts/count-kernels.sh', and 'nvcc' in SKILL.md.
  • [COMMAND_EXECUTION]: The skill implements dynamic loading of GPU kernel code at runtime. Evidence: 'dev.get_or_load_func("my_kernel_name", PTX_SRC)' in SKILL.md.
  • [COMMAND_EXECUTION]: Indirect Prompt Injection risk surface identified. Ingestion points: Processing of CUDA source files (.cu) in kernels/ and SQLite profile exports. Capability inventory: High-privilege command execution (sudo), code compilation (nvcc), and runtime loading of PTX kernels. Boundary markers: Absent. Sanitization: Absent.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 21, 2026, 07:18 PM