run-train
Fail
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_training.pyaccepts an arbitrary command via the--commandargument and executes it usingsubprocess.run(). This allows the execution of any binary available in the system path with user-controlled arguments. - Evidence: In
scripts/run_training.py, theexecute_commandfunction callssubprocess.run(split_command(command), ...)wherecommandis derived from CLI arguments. - [DYNAMIC_EXECUTION]: The script
scripts/write_outputs.pydynamically loads and executes a Python module from a path calculated at runtime that is located outside the skill's own directory structure. - Evidence: In
scripts/write_outputs.py, theload_shared_modulefunction usesimportlib.utilto load a script fromparents[3] / 'shared' / 'scripts' / 'write_run_bundle.py', which resolves to a path three levels above the script's location, creating a dependency on external code.
Recommendations
- AI detected serious security threats
Audit Metadata