new-relic

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill uses a piped remote execution pattern (curl | bash) to install the New Relic CLI from download.newrelic.com. While the domain is legitimate, this pattern executes unverified code directly from the internet. Severity is reduced from HIGH as this is the primary purpose of the skill.
  • [Privilege Escalation] (MEDIUM): The installation instructions require the use of sudo for system-wide changes and service management. Additionally, the Docker configuration uses privileged: true, network_mode: host, and host volume mounts, granting the container extensive access to the host system.
  • [Persistence Mechanisms] (MEDIUM): The skill configures system services via systemctl and modifies configuration files in /etc/, which are persistence mechanisms used to ensure the monitoring agent remains active across system reboots.
  • [External Downloads] (LOW): The skill downloads a Java agent ZIP file from an external server (download.newrelic.com).
  • [Data Exposure & Exfiltration] (SAFE): The skill follows best practices by using placeholders like <YOUR_API_KEY> for sensitive credentials.
Recommendations
  • HIGH: Downloads and executes remote code from: https://download.newrelic.com/install/newrelic-cli/scripts/install.sh - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:31 PM