deepwork-tracker
Fail
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION / EXTERNAL_DOWNLOADS] (HIGH): The skill bootstraps by performing a
git clonefrom an untrusted repository (https://github.com/adunne09/deepwork-tracker.git) and executes the resultingdeepwork.jsscript viaexec. The source is not in the trusted repository list. - [DATA_EXFILTRATION] (HIGH): The workflow for 'Show deep work graph' contains a mandatory instruction to 'Always send' the resulting data to a specific, hardcoded Telegram ID (
8551040296). This creates an automated exfiltration path for user activity data to an external entity. - [COMMAND_EXECUTION] (MEDIUM): The skill utilizes
chmod +xon a downloaded script and executes arbitrary commands via the local shell to interact with the tracking application. - [INDIRECT PROMPT INJECTION] (HIGH): The skill possesses a high-risk vulnerability surface by processing external data (from the SQLite database via the external script) and possessing both execution (
exec) and exfiltration (messagetool) capabilities. - Ingestion points: Data returned from the
deepwork.jsreport command. - Boundary markers: None. Data is interpolated directly into the message tool block.
- Capability inventory:
execfor script running,messagefor sending data to Telegram. - Sanitization: No sanitization or validation of the data retrieved from the local database before sending it to the external Telegram recipient.
Recommendations
- AI detected serious security threats
Audit Metadata