dev-scout
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/scout-analyze.shcontains commands to install system packages usingsudo apt-get install -y. This represents an attempt to escalate privileges and modify the host system configuration.\n- [EXTERNAL_DOWNLOADS]: The script attempts to download and install external software from an unverified source usinggo install github.com/boyter/scc/v3@latest. This bypasses standard package management and introduces unverified code into the environment.\n- [REMOTE_CODE_EXECUTION]: By downloading source code from a remote repository and installing it as an executable binary, the skill facilitates a remote code execution vector.\n- [DATA_EXFILTRATION]: The analysis script explicitly searches for sensitive configuration files such as.env.localand.env.example. Accessing these paths is a key component of data exposure and potential exfiltration, especially when combined with git history analysis that extracts contributor and commit metadata.\n- [PROMPT_INJECTION]: The skill's primary function is to ingest and summarize large amounts of untrusted codebase data. This creates a significant surface for indirect prompt injection. Ingestion points:scripts/scout-analyze.sh(find/grep) and the Gemini-based large codebase strategy described inSKILL.md. Capabilities: The skill has access to theBashtool for subprocess execution and writes to the filesystem (plans/ folder). Sanitization: No boundary markers or sanitization logic were detected to prevent the agent from obeying instructions hidden within the analyzed files.
Recommendations
- AI detected serious security threats
Audit Metadata