agentbay-aio-skills
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill installs the
wuying-agentbay-sdkpackage using a custom index URL (https://mirrors.aliyun.com/pypi/simple/). While Aliyun is a known provider, it is not on the trusted organization list, making the dependency installation unverifiable. - [DATA_EXFILTRATION] (LOW): The script
run_code.pyis designed to read the user's API key from~/.config/agentbay/api_keyand can read local files via the--code-fileargument. This content is then transmitted to the remote AgentBay service. While this is the intended functionality, it constitutes a data exposure path for local files. - [COMMAND_EXECUTION] (LOW): The execution script
run_code.pywrites files (e.g.,chart_{timestamp}.png) to the local working directory based on responses from the remote sandbox. This local file-writing capability is a potential vector if the remote service or the agent's input is compromised. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection (Category 8) because it processes arbitrary code provided by the user or read from files and sends it to an external execution environment without internal sanitization, relying entirely on the remote sandbox's isolation.
Audit Metadata