serverless-modal
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it interpolates user-supplied data from the
$ARGUMENTSvariable directly into its task context. This could allow a malicious user to provide a task description that influences the generated Python code or the shell commands executed by the agent. - Ingestion points: The
$ARGUMENTSvariable is used in theTask: $ARGUMENTSheader withinSKILL.mdto define the agent's objective. - Boundary markers: None. There are no delimiters or instructions to ignore embedded commands within the user input.
- Capability inventory: The skill uses the
Bashtool to run CLI commands and theWritetool to create Python launcher scripts. - Sanitization: The skill does not implement any validation or sanitization logic for the task description before using it to guide script generation.
- [COMMAND_EXECUTION]: The skill orchestrates remote compute by instructing the agent to perform local command execution, including package installation (
pip install modal) and service interaction (modal run,modal deploy). It also generates Python scripts that utilize thesubprocessmodule to execute local training files. These operations are consistent with the skill's primary purpose of serverless GPU compute management.
Audit Metadata