clojure-repl
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
install.shscript downloads and installs multiple CLI tools from an untrusted external GitHub repository:https://github.com/bhauman/clojure-mcp-light.git. - [REMOTE_CODE_EXECUTION]: The installation uses
bbin installto fetch and install scripts directly from a remote repository. These scripts are then executed on the host system to interact with Clojure REPLs. - [COMMAND_EXECUTION]: The skill facilitates the execution of arbitrary Clojure code on running systems via the
clj-nrepl-evaltool. This includes the ability to modify application state, reload code, and execute system commands within the REPL context. - [DATA_EXPOSURE]: Documentation within
SKILL.mdprovides explicit instructions on how to access sensitive system components, such as database connection pools (:banzai.*.system/datasource) and Integrant system states, which could lead to unauthorized data access if used maliciously.
Recommendations
- AI detected serious security threats
Audit Metadata