dialogue-audio
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Remote Code Execution (CRITICAL): The skill explicitly commands the execution of a remote script from
https://cli.inference.shby piping it directly to the shell (| sh). This pattern bypasses verification and allows an external source to execute arbitrary code on the user's system.\n- External Downloads (MEDIUM): The skill references and installs additional capabilities vianpx skills add inference-sh/skills, which points to an untrusted third-party organization not included in the safe list.\n- Command Execution (MEDIUM): The skill utilizesBash(infsh *), granting the agent broad authority to execute any subcommand of the potentially maliciousinfshCLI tool downloaded in the previous step.\n- Indirect Prompt Injection (LOW): The skill provides an interface for processing external text through theinfshtool without sanitization.\n - Ingestion points: User input is interpolated into the
promptfield of theinfsh app runcommand withinSKILL.md.\n - Boundary markers: None present to isolate user-provided text from command instructions.\n
- Capability inventory: Uses
bashto interact with external inference APIs and manage local file output.\n - Sanitization: No input validation or escaping mechanisms are implemented for the processed text.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata