vastai
Warn
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The deployment bootstrap script (
serverless/remote/serve_deployment.py) includes functionality to download code packages from remote URLs, extract them, and execute setup scripts. This involves installing system packages viaapt-get, installing Python dependencies viauv, and running arbitrary shell commands. - Evidence:
urllib.request.urlopen(download_url),tarfile.open().extract(filter='fully_trusted'), andsubprocess.run(["sh", "-c", entry])inserverless/remote/serve_deployment.py. - [COMMAND_EXECUTION]: The skill makes extensive use of the
subprocessmodule to invoke external system binaries required for its utility functions. - Evidence:
subprocess.run(["rsync", ...])for data transfers incli/commands/storage.py.subprocess.run(["ssh-keygen", ...])for credential generation incli/util.py.subprocess.Popen(["less", ...])for output display management incli/display.py.- [EXTERNAL_DOWNLOADS]: The tool performs network operations to retrieve configuration files, metadata, and deployment blobs from Vast.ai's infrastructure.
- Evidence:
- Fetches deployment tarballs from presigned URLs in
serverless/remote/serve_deployment.py. - Downloads official SSL root certificates from
console.vast.aiinasync_/client.pyandserverless/client/client.py. - Retrieves GPU model metadata and unique identifiers from vendor API endpoints in
cli/util.py.
Audit Metadata