molfeat
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DYNAMIC_EXECUTION]: The skill's documentation and code examples (found in
SKILL.mdandreferences/examples.md) demonstrate the use ofpickle.load()for caching molecular embeddings. Thepicklemodule is known to be vulnerable to arbitrary code execution because it can deserialize objects that trigger command execution. Providing this as a recommended pattern without explicit security warnings creates a vulnerability surface if users load cache files from untrusted or external sources.\n - Evidence:
embeddings = pickle.load(f)inSKILL.mdandreferences/examples.md.\n- [EXTERNAL_DOWNLOADS]: The skill automates the discovery and downloading of pre-trained machine learning models and chemical embeddings from external hubs such as HuggingFace, DGL-LifeSci, and Microsoft Research repositories. These are treated as well-known technology services and are documented as part of the core featurization workflow.\n - Evidence: Documented use of
PretrainedMolTransformerandModelStorefor loading models likeChemBERTa-77M-MLMandGraphormer-pcqm4mv2inreferences/api_reference.mdandreferences/available_featurizers.md.
Audit Metadata