skill-system-gate
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Vulnerability in
scripts/check_registry.shandscripts/validate_exp.shwhere user-supplied input is directly inserted into a Python command string. The shell scripts usepython3 -c "... '$EXP_NAME' ...". Because the Python code is contained within a double-quoted string in Bash, the$EXP_NAMEvariable is expanded by the shell before the Python interpreter is launched. An attacker can provide a malicious payload (e.g.,'); import os; os.system('id'); #) to break out of the intended Python string and execute arbitrary system commands. - [COMMAND_EXECUTION]: Disclosure of internal system paths and metadata. The skill hardcodes absolute file system paths as defaults (e.g.,
/datas/store162/arthur0824hao/Study/GNN/FraudDetect/SubProject/Phase3), revealing the host's directory structure and the local username.
Recommendations
- AI detected serious security threats
Audit Metadata