jgi-lakehouse

Warn

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [PERSISTENCE_MECHANISMS]: The documentation in README.md and docs/authentication.md instructs users to modify their ~/.bashrc file to automatically export the DREMIO_PAT authentication token, which is a persistence mechanism for environment variables.
  • [EXTERNAL_DOWNLOADS]: The skill recommends installing a Python wheel from a non-whitelisted GitHub release URL (https://github.com/dremio-hub/arrow-flight-client-examples/releases/download/dremio_flight-1.1.0-py3-none-any.whl) in README.md and docs/arrow-flight-python.md.
  • [DATA_EXFILTRATION]: Both scripts/rest_client.py and scripts/get_dremio_token.sh default to using unencrypted HTTP (http://) for communication with the JGI Lakehouse endpoint. This results in sensitive authentication tokens and potentially credentials being transmitted over the network in plain text.
  • [EXTERNAL_DOWNLOADS]: Network operations in scripts/rest_client.py, scripts/get_dremio_token.sh, and scripts/download_img_genomes.py explicitly disable SSL certificate verification (using verify=False or --insecure), which significantly increases the risk of Man-in-the-Middle (MitM) attacks.
  • [COMMAND_EXECUTION]: The skill utilizes system commands for file management, including tar -xzf and shutil.copy in scripts/download_img_genomes.py and SKILL.md to process genome packages from the JGI filesystem.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 18, 2026, 01:40 PM