register-ml-model
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The GitHub Actions workflow template in
references/EXAMPLES.md(Step 6) interpolates user-controlled variables${{ github.event.inputs.model_name }}and${{ github.event.inputs.version }}directly into a shell script block (run: | ...). This allows an attacker to execute arbitrary commands by providing crafted inputs. - [CREDENTIALS_UNSAFE]: Step 1 in
SKILL.mdprovides a shell command for starting an MLflow server that includes a hardcoded passwordpassin the database connection stringpostgresql://user:pass@localhost:5432/mlflow. - [PROMPT_INJECTION]: The skill is vulnerable to indirect injection through untrusted model metadata. 1. Ingestion points: User inputs in
references/EXAMPLES.mdand model metadata (tags, descriptions) retrieved from MLflow instage_management.pyandmodel_lineage.py. 2. Boundary markers: Absent. No delimiters or instructions are used to separate untrusted metadata from command logic or output reports. 3. Capability inventory: Shell command execution inreferences/EXAMPLES.md, model stage modification instage_management.py, and local file writing inmodel_lineage.py. 4. Sanitization: Absent. No input validation, escaping, or filtering is performed on model names, versions, or tags before they are used in commands or logic.
Recommendations
- AI detected serious security threats
Audit Metadata