omx
Fail
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
oh-my-codexpackage from the public npm registry to provide its core functionality. - [REMOTE_CODE_EXECUTION]: The instructions explicitly recommend using the
--madmaxflag, which maps to the--dangerously-bypass-approvals-and-sandboxconfiguration in the Codex CLI. This disables critical safety guardrails and allows the agent to execute code without user oversight or sandbox restrictions. - [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to perform complex system-level tasks, including managing tmux sessions and parallel team workers, which increases the impact of any compromised or malicious instructions. - [PROMPT_INJECTION]: The autonomous execution modes such as
$autopilotand$ralphcreate a significant vulnerability to indirect prompt injection. If the agent processes untrusted external data while the security sandbox is disabled via the recommended flags, it could be coerced into performing malicious system operations.
Recommendations
- AI detected serious security threats
Audit Metadata