jgi-lakehouse
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PERSISTENCE_MECHANISMS]: The documentation in
README.mdanddocs/authentication.mdinstructs users to modify their~/.bashrcfile to automatically export theDREMIO_PATauthentication token, which is a persistence mechanism for environment variables. - [EXTERNAL_DOWNLOADS]: The skill recommends installing a Python wheel from a non-whitelisted GitHub release URL (
https://github.com/dremio-hub/arrow-flight-client-examples/releases/download/dremio_flight-1.1.0-py3-none-any.whl) inREADME.mdanddocs/arrow-flight-python.md. - [DATA_EXFILTRATION]: Both
scripts/rest_client.pyandscripts/get_dremio_token.shdefault to using unencrypted HTTP (http://) for communication with the JGI Lakehouse endpoint. This results in sensitive authentication tokens and potentially credentials being transmitted over the network in plain text. - [EXTERNAL_DOWNLOADS]: Network operations in
scripts/rest_client.py,scripts/get_dremio_token.sh, andscripts/download_img_genomes.pyexplicitly disable SSL certificate verification (usingverify=Falseor--insecure), which significantly increases the risk of Man-in-the-Middle (MitM) attacks. - [COMMAND_EXECUTION]: The skill utilizes system commands for file management, including
tar -xzfandshutil.copyinscripts/download_img_genomes.pyandSKILL.mdto process genome packages from the JGI filesystem.
Audit Metadata