ascend-npu-driver-install

Warn

Audited by Socket on Apr 3, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/install_npu_driver.sh

This Bash module itself does not show overt malicious behaviors such as exfiltration, reverse shells, or credential theft. However, it is a high-impact privileged installer that selects driver/firmware .run packages from a user-controlled directory by filename regex and then executes them as root, with only a gate provided by an external local Python checker whose integrity/provenance and validation strength are not enforced here. The primary security concern is supply-chain/host compromise if the installer artifacts or ./check_package.py are tampered with. Additionally, automatic dependency installation via yum/apt increases trust surface. Recommend enforcing cryptographic hash/signature verification for all artifacts (including check_package.py) and ensuring controlled, trusted execution context.

Confidence: 62%Severity: 66%
Audit Metadata
Analyzed At
Apr 3, 2026, 06:49 AM
Package URL
pkg:socket/skills-sh/Ascend%2Fagent-skills%2Fascend-npu-driver-install%2F@3673fcff4c19d10e14a8158d14376f661cb6a3f1