open-alva
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The Alva platform enables remote execution of JavaScript code in a cloud-side V8 isolate via the
/api/v1/runAPI endpoint and scheduled cronjob deployments, as described inSKILL.mdandreferences/api-reference.md. - [COMMAND_EXECUTION]: Documentation in
references/adk.mdincludes a 'Calculator Agent' example that uses theeval()function to process input. This pattern is dangerous as it allows for arbitrary code execution if the input provided by the agent is not strictly validated. - [DATA_EXFILTRATION]: The runtime environment provides a
net/httpmodule for arbitrary network requests and analfsmodule for filesystem access. This combination allows for reading local files and exfiltrating their content to external, non-whitelisted domains. - [EXTERNAL_DOWNLOADS]: The
net/httpmodule allows for fetching and executing external content or scripts at runtime, as demonstrated in the tool-calling examples inreferences/adk.md.
Audit Metadata