ffind

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • Privilege Escalation (HIGH): The skill instructions and examples direct the agent to use sudo for filesystem extraction tasks (e.g., sudo ffind <path> -e). Providing the agent with instructions to bypass standard permission boundaries using root privileges is a significant security risk.
  • Command Execution (MEDIUM): The skill executes an external binary ffind from the iothackbot bin directory. The source, integrity, and safety of this binary are unknown and unverified within the skill content.
  • Indirect Prompt Injection (LOW): The skill is designed to analyze firmware and binary files which are untrusted external data sources.
  • Ingestion points: The agent ingests data by running ffind on arbitrary user-provided file paths.
  • Boundary markers: There are no instructions provided to treat the tool's output as untrusted or to use delimiters to prevent instructions within the files from being interpreted by the agent.
  • Capability inventory: The agent has the capability to execute shell commands and escalate to root privileges.
  • Sanitization: No sanitization or validation of the input file content or the resulting tool output is mentioned.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:28 PM