yandex-wordstat
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): Scripts such as
scripts/common.shandscripts/top_requests.shload environment variables by sourcing theconfig/.envfile using thesourceor.command. Thescripts/get_token.shscript populates this file with user-provided tokens without input validation. This creates a vector for command injection: a malicious string like$(reboot)provided as a token would be executed in the shell context whenever any of the API scripts are run.\n- [REMOTE_CODE_EXECUTION] (MEDIUM): The scriptscripts/query_total.shattempts to execute an external file namedmissed_demand.pyusing theuvtool. This Python script is not included in the provided skill package, making its logic and dependencies unverifiable and potentially unsafe.\n- [DATA_EXFILTRATION] (LOW): The skill transmits the user's API token and search phrases toapi.direct.yandex.comandapi.wordstat.yandex.net. While these network operations are core to the skill's purpose, they target non-whitelisted external domains.\n- [PROMPT_INJECTION] (LOW): The skill processes untrusted search queries via the--phraseargument and interpolates them into JSON payloads for network requests. Although it implements basic character escaping, the lack of robust sanitization poses a risk for indirect prompt injection if the API responses are processed by an agent. Ingestion:--phrasecommand-line argument; Boundary markers: JSON object delimiters; Capability inventory:curlnetwork requests anduvexecution; Sanitization:json_escapefunction inscripts/common.sh.
Audit Metadata