ssh-info
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/status.shscript is vulnerable to command injection via its configuration ingestion point (overlay.yaml). It lacks boundary markers and sanitization when interpolating variables like$containerand$urlinto shell commands executed viabash -lcorssh. Its capability inventory includes arbitrary shell and remote command execution. - [REMOTE_CODE_EXECUTION]: The skill's primary purpose is to execute commands on remote servers using
sshbased on user-defined targets and keys. This provides a remote code execution capability on the infrastructure defined in the client overlay. - [EXTERNAL_DOWNLOADS]: The skill executes scripts from shared and platform-specific paths outside its own directory, specifically
_shared/scripts/resolve_context.pyand management tools located in~/.claude/skills/skill-issue/scripts/. - [DATA_EXFILTRATION]: The skill uses
curlto access health check URLs defined in the local configuration. This surface allows for potential data exfiltration or SSRF if the configuration is pointed to a malicious external endpoint.
Audit Metadata