upgrading-golang
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The skill implements a 'curl | sh' pattern to download and execute scripts directly from the internet.
- Evidence: Step 7c in
SKILL.mdusescurl -sSf https://atlasgo.sh | ... sh -s -- -yto install the Atlas CLI. - Source Status: The domain
atlasgo.shis not a trusted source according to the [TRUST-SCOPE-RULE]. - Risk: This allows the external site to execute arbitrary code on the runner's machine with no integrity verification.
- PROMPT_INJECTION / INDIRECT POISONING (HIGH): The skill lacks sanitization for user-provided version strings which are then used to modify high-privilege configuration files.
- Ingestion points: User-provided Go version (Step 1) and Atlas version (Step 1).
- Boundary markers: None. Input is directly interpolated into patterns.
- Capability inventory: Write access to
go.mod, multipleDockerfiles, and GitHub Action workflows (lint.yml,test.yml,release.yaml,codeql.yml); execution ofmake,go, anddocker. - Sanitization: None. The skill assumes the user provides a valid version string.
- Risk: A malicious version string (e.g., containing newlines or shell metacharacters) could inject malicious steps into CI/CD workflows or backdoors into Dockerfiles.
- EXTERNAL_DOWNLOADS (MEDIUM): The skill downloads Docker images and binaries from non-whitelisted third-party registries.
- Evidence:
docker pull arigaio/atlas:X.XX.Xandcurl https://atlasgo.sh. - Context: While
arigaiois the official Atlas maintainer, it is not within the predefined trusted organization list, making these unverifiable dependencies in this security context. - COMMAND_EXECUTION (MEDIUM): The skill executes multiple shell commands with side effects on the local filesystem.
- Evidence:
make test,make lint,go mod tidy,wire ./..., andbuf format -win Steps 8 and 9. - Risk: Because these commands run after the skill has modified project files based on user input, they could trigger malicious logic if the modifications included injection payloads.
Recommendations
- AI detected serious security threats
Audit Metadata