image-upscaling
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill explicitly instructs the agent or user to execute a remote script via a piped shell command (
curl | sh). This allows the remote server to execute arbitrary code on the local system. - Evidence:
SKILL.mdcontainscurl -fsSL https://cli.inference.sh | sh. - Verification: This matches a confirmed detection pattern for untrusted remote code execution.
- [COMMAND_EXECUTION] (HIGH): The skill relies on executing the
infshbinary, which is a third-party executable downloaded at runtime without verification from a trusted platform. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill references and downloads assets from
inference.shanddist.inference.sh, which are not recognized as trusted sources. - [PROMPT_INJECTION] (LOW): The skill possesses an indirect prompt injection surface by taking untrusted data (URLs and prompts) and passing them as arguments to a CLI tool.
- Ingestion points:
image_urlandpromptfields in JSON payloads. - Boundary markers: None present to distinguish between instructions and data.
- Capability inventory: Command execution via
Bashtool. - Sanitization: No sanitization logic is evident in the skill instructions.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata