anki-ai-cli
Warn
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The workflow examples consistently use
npx -y anki-ai, which automatically downloads and executes the package from the npm registry without manual intervention or version pinning. - [COMMAND_EXECUTION] (MEDIUM): The skill documentation includes commands for extensive file system interaction, such as
importPackage,exportPackage, andstoreMediaFileusing local paths (e.g.,/Users/me/backup/). This grants the agent the capability to read from and write to the host's storage. - [REMOTE_CODE_EXECUTION] (MEDIUM): The
npx -ypattern constitutes a remote code execution risk, as the package content is fetched and executed dynamically. If the package were compromised, the host machine would be at risk. - [DATA_EXFILTRATION] (LOW): The
exportPackageandsyncfunctionalities, combined with the ability to set a customANKI_CONNECT_URL, provide a surface for moving local data to remote locations. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes external data (URLs and local files) to create notes. If an attacker controls a media URL or file path, they could potentially influence the agent's behavior if it parses content from those sources.
Audit Metadata