twitter-thread-creation
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (HIGH): The skill documentation includes a command
curl -fsSL https://cli.inference.sh | sh. This is a high-risk pattern as it executes an unverified remote script directly in the user's shell environment. The domaininference.shis not on the trusted sources list.\n- External Downloads (MEDIUM): The skill usesnpx skills addto install additional unknown skills from theinference-shorganization. These represent unverified third-party dependencies that are downloaded and executed at runtime.\n- Indirect Prompt Injection (LOW): The skill utilizes tools such asinfsh/agent-browserandtavily/search-assistantto fetch data from external URLs, which represents a surface for indirect prompt injection.\n - Ingestion points:
SKILL.md(viainfsh/agent-browserandtavily/search-assistantcalls).\n - Boundary markers: Absent. The skill does not define clear delimiters or instructions for the agent to ignore embedded commands in the fetched content.\n
- Capability inventory: Execution of bash commands via
infshand package installation vianpx.\n - Sanitization: Absent. No evidence of input validation or output escaping is provided.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata