rclone
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Both
SKILL.mdandscripts/check_setup.shrecommend the commandcurl https://rclone.org/install.sh | sudo bash. This executes unverified code from an untrusted external domain directly with administrative privileges. - [COMMAND_EXECUTION] (HIGH): The skill makes extensive use of
sudofor package management (apt, dnf) and script execution, escalating privileges beyond the standard user context. - [EXTERNAL_DOWNLOADS] (MEDIUM): The installation instructions target
rclone.org, which is not on the list of trusted repositories or organizations. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill lacks sanitization for file paths and remote content processed by
rclone. 1. Ingestion points: Local file paths and remote listings viarclone ls. 2. Boundary markers: Absent. 3. Capability inventory: File system read/write and network synchronization via subprocessrclonecalls. 4. Sanitization: None provided for shell-executed path arguments.
Recommendations
- AI detected serious security threats
Audit Metadata