skill-system-gate

Fail

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: Vulnerability in scripts/check_registry.sh and scripts/validate_exp.sh where user-supplied input is directly inserted into a Python command string. The shell scripts use python3 -c "... '$EXP_NAME' ...". Because the Python code is contained within a double-quoted string in Bash, the $EXP_NAME variable is expanded by the shell before the Python interpreter is launched. An attacker can provide a malicious payload (e.g., '); import os; os.system('id'); #) to break out of the intended Python string and execute arbitrary system commands.
  • [COMMAND_EXECUTION]: Disclosure of internal system paths and metadata. The skill hardcodes absolute file system paths as defaults (e.g., /datas/store162/arthur0824hao/Study/GNN/FraudDetect/SubProject/Phase3), revealing the host's directory structure and the local username.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 9, 2026, 08:56 AM