reverse-engineer-rpi
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Category 2] DATA_EXFILTRATION (MEDIUM): The
scripts/fetch_url.pyutility supports thefile://URI scheme. If an attacker provides a malicious--docs-sitemap-url, they could potentially trick the agent into reading and exfiltrating sensitive local files (e.g., SSH keys, configuration files) from the environment where the agent is running. - [Category 4] COMMAND_EXECUTION (MEDIUM): The
scripts/binary/extract_embedded_archives.pyscript useszipfile.extractall()to unpack archives found inside binaries. This is vulnerable to a 'ZipSlip' path traversal attack if a malicious binary contains a ZIP file with filenames like../../evil.sh, allowing an attacker to write files outside of the intended output directory. - [Category 8] INDIRECT PROMPT INJECTION (LOW): The skill ingests untrusted data from binaries (strings and symbols) and remote sitemaps. This data is incorporated into markdown reports that the agent is instructed to process. A malicious binary could contain strings designed to manipulate the agent's logic during the reporting phase.
- Ingestion points:
scripts/fetch_url.py(remote/local URLs),scripts/binary/analyze_binary.sh(strings/disassembly from binaries),scripts/binary/extract_embedded_archives.py(filenames from embedded ZIPs). - Boundary markers:
SKILL.mdcontains high-level instructions to separate 'docs say' from 'code proves', but there are no technical delimiters (e.g., XML tags or special markers) around untrusted content in the generated reports. - Capability inventory: The skill can execute system utilities (
strings,otool,objdump,syft), read local files, and write to the filesystem. - Sanitization: Some output (like strings) is truncated or filtered by regex, but filenames and sitemap paths are used directly without sanitization.
- [Category 10] DYNAMIC EXECUTION (LOW): Several shell scripts (
analyze_binary.sh,extract_docs_features.sh,extract_sitemap_paths.sh) usepython3 -to execute inline Python code. While the code is static within the scripts, this pattern is often used for more complex dynamic execution vectors.
Audit Metadata