kimaki-tools
Warn
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
scripts/link-session-to-discord.shdynamically assembles and executes shell commands using array expansion${SEND_CMD[@]}and direct string interpolation in SQLite queries. - Evidence:
sqlite3 "$DB_PATH" "INSERT INTO thread_sessions (thread_id, session_id) VALUES ('$THREAD_ID', '$SESSION_ID')...". IfSESSION_IDorTHREAD_IDwere maliciously crafted (e.g., from an indirect prompt injection), it could lead to SQL injection or unauthorized database modification. - [EXTERNAL_DOWNLOADS] (MEDIUM): Multiple files execute
npx -y kimaki, which triggers the download and execution of thekimakipackage from the npm registry at runtime. - Evidence:
references/kimaki-tools-reference.mdandscripts/link-session-to-discord.shusenpx -y kimakiextensively. Whilekimakiappears to be the intended tool for this skill, the use of-yautomatically accepts and runs the remote code without user confirmation. - [DATA_EXPOSURE] (LOW): The script reads the local user path to locate the Kimaki SQLite database.
- Evidence:
scripts/link-session-to-discord.shuses a Node regex to extract paths matching/Users/or/home/to find the.dbfile. This exposes the local file system structure to the agent's output context.
Audit Metadata