agentation
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Automated scanners identified a high-risk pattern in the platform hook configurations and verification scripts where the output of a network request (
curl) is piped directly to an interpreter (python3). Although the target islocalhostand the logic is a static Python string, this pattern matches dangerous remote execution vectors that can be exploited if the local server is compromised. - [COMMAND_EXECUTION]: The skill's setup script and documentation instruct the modification of agent settings (e.g.,
~/.claude/settings.json,~/.gemini/settings.json) to add persistent hooks. These hooks execute shell commands automatically during every agent turn or prompt submission to poll for pending UI annotations, leading to frequent and automated command execution. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
agentationandagentation-mcppackages from NPM and references an external GitHub repository (benjitaylor/agentation). The use ofnpxto fetch and run remote packages and the discrepancy between the declared author ('akillness') and the source repository ('benjitaylor') are notable risks. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its core functionality of processing UI feedback.
- Ingestion points: Annotations containing user-provided feedback are fetched from a local endpoint (
http://localhost:4747/pending) and injected into the agent's context via hooks and tools. - Boundary markers: The skill uses simple text delimiters (e.g.,
=== AGENTATION ===) to separate annotations, which are insufficient to prevent a malicious annotation from hijacking the agent's instructions. - Capability inventory: The agent is granted powerful tools including
Bash,Write, andGrep, which could be misused if the agent obeys malicious instructions embedded in an annotation. - Sanitization: There is no evidence of sanitization or escaping of the user-provided
commentorelementPathfields before they are presented to the agent.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost:4747/pending - DO NOT USE without thorough review
Audit Metadata