ascendc-mssanitizer
Warn
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/run_mssanitizer_geir.shscript dynamically generates aCMakeLists.txtfile and invokescmakeandmakeat runtime to compile C++ source files (test_geir_*.cpportest_aclnn_*.cpp) located in the operator's project directory. - [REMOTE_CODE_EXECUTION]: The
scripts/gen_test_script.pyscript generates a Python test file by directly interpolating user-controlled arguments (--operatorand--fallback) into executable Python logic via string formatting. This creates a vulnerability where a maliciously crafted operator name could execute arbitrary code when the resulting test script is run by the agent. - [COMMAND_EXECUTION]: The execution scripts
run_mssanitizer.shandrun_mssanitizer_geir.shuse shell execution to run themssanitizertool and the generated scripts. These scripts also modify environment variables such asLD_LIBRARY_PATHandASCEND_HOME_PATHbased on user-provided or environment paths. - [INDIRECT_PROMPT_INJECTION]: The skill ingests untrusted data from local project files and log files through the
scripts/parse_mssanitizer_log.pytool. While intended for error analysis, this provides a surface for processing attacker-controlled content which could influence the agent's generated report.
Audit Metadata