ascendc-operator-project-init

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses shell commands and local scripts to automate project setup. It runs detect_ascend_kernel_project.sh to find existing projects and uses commands like mkdir, cp, and chmod to set up the file structure. These actions are standard for the skill's stated purpose.
  • [EXTERNAL_DOWNLOADS]: The build.sh script executes a command to install the wheel package from the Python Package Index (PyPI) using pip3 if it is not already installed on the system.
  • [PROMPT_INJECTION]: There is an indirect prompt injection surface where a user-provided operator name is interpolated into shell commands. This is mitigated by explicit instructions within the skill for the agent to validate the input format (snake_case, alphanumeric) before execution.
  • [SAFE]: The CMake configuration files safely query the local environment for library paths (PyTorch, Torch NPU) using the system's Python interpreter, which is a standard procedure for build systems.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 06:48 AM