koog
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The framework provides an
ExecuteShellCommandToolenabling the agent to run arbitrary shell commands on the host system. - [COMMAND_EXECUTION]: The
BraveModeConfirmationHandlerallows for the automatic execution of shell commands without human oversight, creating a significant risk of unauthorized system operations. - [DATA_EXFILTRATION]: The skill includes
ReadFileTool,ListDirectoryTool, andWriteFileTool, which grant the agent the ability to read and modify sensitive files on the local file system. - [DATA_EXFILTRATION]: The
TraceFeatureMessageRemoteWriterallows agent execution data and traces to be sent to arbitrary remote HTTP endpoints, which could be used to exfiltrate system information or session data. - [REMOTE_CODE_EXECUTION]: The combination of the
WriteFileTool(to create scripts) and theExecuteShellCommandTool(to run them) provides a direct vector for remote code execution if the agent is compromised. - [PROMPT_INJECTION]: As an LLM-orchestration framework, it is susceptible to prompt injection attacks where malicious instructions could trigger the dangerous file and shell capabilities.
Recommendations
- AI detected serious security threats
Audit Metadata