remote-cluster-agent
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocessto execute SSH commands locally and bash commands on remote cluster nodes. This is the primary mechanism for all cluster operations, including training management and system monitoring. - [REMOTE_CODE_EXECUTION]: Deploys a persistent Python script (
agent.py) to the remote cluster. This script acts as a high-performance execution bridge, receiving commands via JSON-Lines over stdin and returning results via stdout. This deployment is documented and essential for the skill's low-latency execution feature. - [REMOTE_CODE_EXECUTION]: Automatically configures and manages Mutagen file sync sessions, which involves the automated deployment of the Mutagen agent binary to the remote cluster via SSH.
- [CREDENTIALS_UNSAFE]: Modifies the local
~/.ssh/configfile to add host aliases for cluster nodes. To simplify workflows in dynamic environments, it utilizes options likeStrictHostKeyChecking accept-newandUserKnownHostsFile /dev/null, which are documented and presented to the user during setup. - [DATA_EXFILTRATION]: All network activity is directed to user-specified SSH endpoints defined in the local configuration. No unauthorized external communication or data exfiltration patterns were identified.
- [PROMPT_INJECTION]: The skill processes untrusted output from remote commands (e.g., logs, process lists) during health checks and status updates. It uses boundary markers (
===SECTION===) to structure this data, which helps mitigate the risk of indirect prompt injection from malicious remote content.
Audit Metadata