verl-deploy
Audited by Socket on Apr 24, 2026
2 alerts found:
AnomalySecurityOverall, this code fragment appears to be a legitimate distributed training launcher/orchestrator rather than a malicious payload. The primary security concerns are (1) operationally disruptive commands (pkill -9 python, rm -rf /tmp/ray), (2) execution of a relative downstream script (./run_training.sh), and (3) potential secret leakage by printing a substring of SWANLAB_API_KEY. There are no strong malware indicators (no exfiltration, backdoor, or obfuscated execution) visible in the provided fragment; the highest remaining supply-chain risk is the unseen downstream script and template substitution inputs.
总体为可解释的训练部署技能,核心容器与工具来源大体符合用途,未见明确恶意代码或隐蔽窃取指令。但其风险不低:它会执行高权限主机/容器命令、运行时安装未锁定依赖,并将 SwanLab API Key 转发给由用户指定的 Host,还建议显示本地登录配置。用途与能力基本一致,因此更像高风险运维/集成技能而非恶意技能;最终分类为 SUSPICIOUS。