file-cleaner

Fail

Audited by Gen Agent Trust Hub on Mar 13, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The find_garbage.py script generates a bash script (cleanup.sh) to automate file deletion. It uses unsafe string interpolation (rm -f "{file['path']}") without escaping shell metacharacters. If an attacker creates a file with a name containing shell command sequences (e.g., $(command) or backticks), those commands will execute when the generated script is run.
  • [COMMAND_EXECUTION]: The documentation in SKILL.md encourages high-risk operations, specifically recommending that users execute the generated shell scripts (bash cleanup.sh) and use sudo to clean system directories. This combination of a command injection vulnerability and instructions to run as a privileged user creates a path for full system compromise.
  • [COMMAND_EXECUTION]: The skill implements automated and interactive mass-deletion capabilities. While it includes some directory exclusions, the reliance on automated scans to generate deletion lists poses a risk of data loss if the tool is manipulated or if the AI agent misinterprets the scan results.
  • [COMMAND_EXECUTION]: The entry point bash script (scripts/file-cleaner) contains multiple syntax errors and incorrect path assumptions, indicating poor code quality and increasing the likelihood of unexpected behavior during execution.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 13, 2026, 06:59 AM