run-train
Warn
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_training.pyexecutes commands passed via the--commandargument usingsubprocess.run. While it usesshlex.splitto parse arguments, it allows execution of any binary available in the environment. - [REMOTE_CODE_EXECUTION]: The script
scripts/write_outputs.pydynamically loads and executes a Python script from a path calculated relative to its own location (../../../shared/scripts/write_run_bundle.py) usingimportlib.util. This dynamic loading mechanism executes code from a path outside the skill's own directory. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection by parsing the output of training commands. * Ingestion points: STDOUT and STDERR of the training process are captured and parsed in
scripts/run_training.py. * Boundary markers: No delimiters or warnings are used when processing the command output. * Capability inventory: The skill can execute arbitrary subprocesses, read/write files, and access git status. * Sanitization: No sanitization or escaping is performed on the log data before regex extraction.
Audit Metadata