press-release-writing
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The skill documentation includes a command to download and execute a script directly from a URL:
curl -fsSL https://cli.inference.sh | sh. This is a highly dangerous pattern as it executes unverified code with the privileges of the current user. - Evidence: Source URL:
https://cli.inference.sh. - Trust Status: Untrusted. The domain
inference.shis not included in the allowed list of trusted organizations or repositories. - EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes
npx skills addto fetch and install external skills from theinference-shorganization. These dependencies are not version-locked and reside on an untrusted external registry. - INDIRECT_PROMPT_INJECTION (LOW): The skill uses the
infshtool to perform web searches (e.g.,tavily/search-assistant,exa/search), which ingests untrusted third-party data into the agent's context. - Ingestion points: Output from
infsh app runcommands (search results and market data). - Boundary markers: Absent. The skill does not define delimiters or instructions to ignore embedded commands in the search output.
- Capability inventory: The
allowed-toolsincludesBash(infsh *), which provides broad access to execute various CLI applications and system commands. - Sanitization: Absent. There is no evidence of filtering or escaping logic for the data returned from search providers.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata