env-debug
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill instructs the agent to download and execute a script directly into the shell from an external source.
- Evidence:
references/troubleshooting.mdcontainscurl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh | bash. - Context: The source domain and organization (nvm-sh) are not on the trusted list, making this a classic RCE vector.
- COMMAND_EXECUTION (HIGH): Numerous commands require or suggest elevated privileges and system-level modifications.
- Evidence:
SKILL.md,references/troubleshooting.md, andscripts/env-checker.shincludesudo chown,sudo usermod,sudo systemctl, andsudo tee. - Note: These commands can be used for privilege escalation if the agent's context is manipulated.
- PERSISTENCE (MEDIUM): The skill provides instructions to modify shell startup files to persist environment changes.
- Evidence:
SKILL.mdandreferences/troubleshooting.mdsuggest appending commands to~/.bashrcand~/.zshrc. - Risk: While legitimate for PATH configuration, this is the primary mechanism for establishing persistence on a system.
- CREDENTIALS_UNSAFE (LOW): The skill includes hardcoded placeholder credentials and demonstrates insecure practices.
- Evidence:
SKILL.mdcontainsexport API_KEY="abc123". - Note: Although presented as examples, hardcoded keys in scripts are a violation of security best practices.
- COMMAND_EXECUTION (MEDIUM): Use of dynamic execution for environment initialization.
- Evidence:
references/troubleshooting.mdincludeseval "$(pyenv init -)". - INDIRECT PROMPT INJECTION (LOW): The skill ingests untrusted data through environment files without sanitization.
- Ingestion point:
references/troubleshooting.mdshowssource .env. - Boundary markers: Absent.
- Capability inventory: High (sudo, kill, chmod, eval).
- Sanitization: None. This creates a surface where malicious instructions in a .env file could be executed with high privileges.
Recommendations
- AI detected serious security threats
Audit Metadata