base64-encoder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The
scripts/base64_encoder.pyscript accepts a--fileargument which is passed directly toopen(). An attacker using indirect prompt injection could trick the agent into reading sensitive files (e.g.,~/.ssh/id_rsa,.env) and outputting their Base64 encoded content to the console. - Privilege Escalation (HIGH): The
--outputargument allows the tool to write files to any path accessible by the user. This can be used to overwrite critical files like~/.bashrcor~/.ssh/authorized_keysto gain persistent access or escalate privileges. - Metadata Poisoning (MEDIUM): The
SKILL.mdfile claims the source repository ishttps://github.com/python/cpython. While the script uses the Python standard library, the script itself is not part of the CPython project, making this a misleading claim of trust. - Indirect Prompt Injection (HIGH): This skill has a high vulnerability surface because it processes untrusted data and possesses dangerous capabilities.
- Ingestion points: File input via
--file, text input via positional arguments, andsys.stdininscripts/base64_encoder.py. - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory: Arbitrary file read (
open(..., 'rb')) and arbitrary file write (open(..., 'wb')) inscripts/base64_encoder.py. - Sanitization: Absent. There is no path validation or restriction (e.g., sandboxing to a specific directory).
Recommendations
- AI detected serious security threats
Audit Metadata