ai-scanner-garak
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs the user to run a command that downloads a script from a remote URL (
https://raw.githubusercontent.com/0din-ai/ai-scanner/main/scripts/install.sh) and pipes it directly into the bash shell. This allows for arbitrary code execution on the host system without prior inspection of the script's contents. - [COMMAND_EXECUTION]: Multiple shell commands are provided for installation and management, including
docker compose,openssl, andbundle install. These commands perform significant system changes and process execution. - [EXTERNAL_DOWNLOADS]: The skill downloads multiple external resources at runtime, including a Docker Compose configuration, an environment template, and the main installation script from the
0din-aiGitHub repository. - [CREDENTIALS_UNSAFE]: The documentation provides instructions for setting sensitive environment variables such as
POSTGRES_PASSWORD,SECRET_KEY_BASE, andOPENAI_API_KEYin a.envfile. While storing these in.envis a standard practice, the skill also mentions default credentials (admin@example.com/password) which must be changed immediately.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/0din-ai/ai-scanner/main/scripts/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata