aria2-json-rpc
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Data Exposure] (HIGH): The skill manages RPC authentication secrets stored at
~/.config/aria2-skill/config.json, which is a sensitive file path for credential storage. - [Indirect Prompt Injection] (HIGH): The skill handles untrusted URIs and torrent files, which can be used to execute malicious download tasks. 1. Ingestion points:
add-torrent.py(torrent files) andrpc_client.py(URIs). 2. Boundary markers: Absent; no delimiting or 'ignore' instructions for external content are provided in prompts. 3. Capability inventory: The skill can perform arbitrary network requests and write files via the aria2 service. 4. Sanitization: Absent; external input is passed directly to the rpc client methods. - [Unverifiable Dependencies] (LOW): The skill recommends the installation of the
websocketspackage for optional monitoring features, which is a standard PyPI dependency.
Recommendations
- AI detected serious security threats
Audit Metadata