jqopenclaw-node-invoker
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
node.selfUpdatecommand allows the agent to download an executable from an arbitrarydownloadUrlprovided as a parameter. The process involves downloading via HTTP, verifying an MD5 hash, and executing a generated batch script to replace the current node binary. This constitutes a high-risk remote code execution pathway. - [COMMAND_EXECUTION]: The skill exposes
process.execandsystem.runcapabilities, which allow the execution of arbitrary system programs and shell commands with arguments and custom environment variables. Additionally,system.inputallows for the simulation of raw keyboard and mouse events, which can be used to bypass UI-based security prompts. - [DATA_EXFILTRATION]: Multiple commands facilitate the access and potential exfiltration of sensitive information.
file.readprovides arbitrary file system access (including multi-part reading),system.screenshotcaptures all available screens, andsystem.clipboardallows reading the current system clipboard content. - [PROMPT_INJECTION]: The skill is highly vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: The agent reads potentially untrusted data from the file system (
file.read), process lists (process.manage), and the system clipboard (system.clipboard). - Boundary markers: The documentation does not specify the use of delimiters or 'ignore' instructions to prevent the agent from obeying commands embedded in this external data.
- Capability inventory: The skill possesses powerful write and execute capabilities (
process.exec,system.run,file.write,node.selfUpdate). - Sanitization: There is no mention of sanitizing or filtering input from these external sources before the agent processes it.
- [COMMAND_EXECUTION]: The
file.writecommand allows the agent to write arbitrary content to files, move files, and delete data (to the trash), which can be used to modify system configurations or plant malicious scripts.
Recommendations
- AI detected serious security threats
Audit Metadata