deploy
Fail
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The generated
Makefilecontains an unquoted shell variable expansion for the health check URL. The instruction@curl -s $${HEALTH_URL:-http://localhost/health}allows the shell to expand theHEALTH_URLenvironment variable without quoting. If this variable contains shell metacharacters (e.g.,;,&&, or|), an attacker or a malicious environment configuration can trigger arbitrary command execution when the user runsmake status. - [REMOTE_CODE_EXECUTION]: The skill implements a pattern where the output of a network request is piped directly to the
python3interpreter. While the provided template specifies the-m json.toolmodule for formatting, this "pipe-to-interpreter" pattern is a high-risk vector for remote code execution. When combined with the unquoted variable expansion in the same command line, it increases the risk of an attacker subverting the command to execute arbitrary Python code. - [PROMPT_INJECTION]: The skill's architecture for generating deployment scripts is susceptible to indirect prompt injection because it interpolates untrusted data into executable files without sanitization.
- Ingestion points: User-provided values from the 'Interactive Questionnaire' (e.g., Project type, Health URL, User/Server targets) in
SKILL.mdare used to fill script templates. - Boundary markers: Absent; the skill uses simple
{PLACEHOLDER}markers without instructing the AI agent to use delimiters or treat the input as untrusted data. - Capability inventory: The generated scripts (
deploy.sh,verify.sh,Makefile) have extensive system access, including file system writes,rsyncnetwork transfers, and shell execution. - Sanitization: Absent; there are no instructions or regex patterns provided to the AI agent to escape or validate user-supplied strings before they are written into the generated shell scripts.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost/health} - DO NOT USE without thorough review
Audit Metadata