cafe3310-skill-installer
Fail
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The instructions in
SKILL.mddirect the agent to clone a third-party repository fromhttps://github.com/cafe3310/public-agent-skills.gitand execute a script located atskills/cafe3310-skill-installer/scripts/install.sh. Downloading and running scripts from unverified external sources is a high-risk pattern that allows for arbitrary code execution. - [COMMAND_EXECUTION]: The skill requires the agent to perform administrative actions including
chmod +xto modify file permissions andbashto execute the installer. This provides the external script full execution capabilities on the host environment. - [EXTERNAL_DOWNLOADS]: The skill fetches resources from an external Git repository. While the repository belongs to the skill's author, the lack of integrity checks (like commit pinning or checksums) means the code being executed could change at any time without user awareness.
- [PRIVILEGE_ESCALATION]: The installer script
scripts/install.shtargets sensitive user-level directories including~/.agents,~/.claude, and~/.gemini. It performs file system operations such asrm -rfandcp -ron these directories, which could lead to accidental or malicious data loss if the target directory contains unrelated sensitive information.
Recommendations
- AI detected serious security threats
Audit Metadata