omg
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's master installation script (
scripts/install.sh) downloads and executes shell scripts directly fromhttps://plannotator.ai/install.shandhttps://bun.sh/installby piping them tobash. This pattern allows for the execution of arbitrary, unverified code with user privileges.\n- [COMMAND_EXECUTION]: Multiple scripts, such asscripts/check-status.shandscripts/plannotator-plan-loop.sh, usepython3 -corevalto execute dynamically generated strings, which increases the risk of command injection.\n- [DATA_EXPOSURE]: Setup scripts (scripts/setup-claude.sh,scripts/setup-codex.sh,scripts/setup-gemini.sh) read and modify sensitive local configuration files, including~/.claude/settings.json,~/.codex/config.toml, and~/.gemini/settings.json.\n- [PROMPT_INJECTION]: The skill defines complex orchestration protocols that rely on the agent following specific, rigid instructions and state transitions. These instructions are designed to override the agent's default task processing logic.\n- [PROMPT_INJECTION]: Indirect prompt injection surface identified:\n - Ingestion points: Data is fetched from
http://localhost:4747/pendinginscripts/claude-agentation-submit-hook.pyandscripts/setup-codex.sh.\n - Boundary markers: Absent; the ingested data is printed directly into the agent's context without delimiters.\n
- Capability inventory: The agent has access to powerful tools including
Bash,Write,Task, andGrep.\n - Sanitization: None; the
commentfield from the JSON response is printed to the agent's context without any escaping or validation.\n- [EXTERNAL_DOWNLOADS]: The skill attempts to install several external tools globally or vianpx, includingagent-browser,playwriter,agentation-mcp,oh-my-opencode, andoh-my-ag, from public registries without verifying specific versions or integrity hashes.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install, http://localhost:4747/pending - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata