rtk
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
scripts/install.shscript employs a dangerous 'curl-pipe-to-shell' pattern, fetching an installation script fromhttps://raw.githubusercontent.com/akillness/rtk/refs/heads/master/install.shand executing it viash. This allows for arbitrary code execution from a remote repository that is not part of a trusted vendor list. - [EXTERNAL_DOWNLOADS]: The skill performs multiple remote downloads at runtime, including fetching binary artifacts from the
rtk-ai/rtkGitHub repository and usingcargo install --gitto pull source code from the author's personal repository. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute several local scripts (install.sh,init-agent.sh,check-status.sh). These scripts perform system modifications such as modifying thePATHenvironment variable, installing packages viabreworcargo, and creating plugin files in local configuration directories (e.g.,~/.config/opencode/plugins/rtk.ts). - [COMMAND_EXECUTION]: The
rtk initfunctionality (managed byscripts/init-agent.sh) installs persistent shell hooks that automatically intercept and rewrite shell command outputs. While intended for token optimization, such hooks represent a persistent modification to the agent's operating environment that could be abused if the underlying binary is compromised.
Recommendations
- AI detected serious security threats
Audit Metadata