ai-scanner-garak

Fail

Audited by Gen Agent Trust Hub on Mar 25, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill instructs the user to run a command that downloads a script from a remote URL (https://raw.githubusercontent.com/0din-ai/ai-scanner/main/scripts/install.sh) and pipes it directly into the bash shell. This allows for arbitrary code execution on the host system without prior inspection of the script's contents.
  • [COMMAND_EXECUTION]: Multiple shell commands are provided for installation and management, including docker compose, openssl, and bundle install. These commands perform significant system changes and process execution.
  • [EXTERNAL_DOWNLOADS]: The skill downloads multiple external resources at runtime, including a Docker Compose configuration, an environment template, and the main installation script from the 0din-ai GitHub repository.
  • [CREDENTIALS_UNSAFE]: The documentation provides instructions for setting sensitive environment variables such as POSTGRES_PASSWORD, SECRET_KEY_BASE, and OPENAI_API_KEY in a .env file. While storing these in .env is a standard practice, the skill also mentions default credentials (admin@example.com / password) which must be changed immediately.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/0din-ai/ai-scanner/main/scripts/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 25, 2026, 08:50 AM