logo-design-guide
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Detected the use of piped remote script execution via
curl -fsSL https://cli.inference.sh | sh. This pattern allows a remote server to execute arbitrary commands on the system without prior local verification. - [EXTERNAL_DOWNLOADS] (HIGH): The skill installs software and dependencies from an untrusted domain (
inference.sh). This includes the initial CLI installer and additional components fetched vianpx skills add. - [COMMAND_EXECUTION] (MEDIUM): The skill utilizes the
Bashtool to run theinfshCLI. This allows for broad system interaction beyond the intended scope of image generation. - [PROMPT_INJECTION] (LOW): The skill exhibits an indirect prompt injection surface by passing user-defined strings into shell commands.
- Ingestion points: The
promptfield within theinfsh app runcommands. - Boundary markers: Absent; instructions and data are not clearly delimited.
- Capability inventory: Shell command execution via
Bashtool and network requests via theinfshbinary. - Sanitization: No evidence of sanitization or escaping for user-supplied prompt strings.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata