file-cleaner
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
find_garbage.pyscript generates a bash script (cleanup.sh) to automate file deletion. It uses unsafe string interpolation (rm -f "{file['path']}") without escaping shell metacharacters. If an attacker creates a file with a name containing shell command sequences (e.g.,$(command)or backticks), those commands will execute when the generated script is run. - [COMMAND_EXECUTION]: The documentation in
SKILL.mdencourages high-risk operations, specifically recommending that users execute the generated shell scripts (bash cleanup.sh) and usesudoto clean system directories. This combination of a command injection vulnerability and instructions to run as a privileged user creates a path for full system compromise. - [COMMAND_EXECUTION]: The skill implements automated and interactive mass-deletion capabilities. While it includes some directory exclusions, the reliance on automated scans to generate deletion lists poses a risk of data loss if the tool is manipulated or if the AI agent misinterprets the scan results.
- [COMMAND_EXECUTION]: The entry point bash script (
scripts/file-cleaner) contains multiple syntax errors and incorrect path assumptions, indicating poor code quality and increasing the likelihood of unexpected behavior during execution.
Recommendations
- AI detected serious security threats
Audit Metadata