CORE
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- Remote Code Execution (CRITICAL): The skill contains several instances of the 'curl | bash' pattern, which executes remote scripts with full shell privileges.
Workflows/Transcription.mdcontainscurl -LsSf https://astral.sh/uv/install.sh | sh.- Automated scanners detected
curl -fsSL https://claude.ai/install.sh | bash. Neither source is in the trusted repository list. - Command Execution (HIGH): High-risk command execution patterns were identified across multiple files.
Workflows/HomeBridgeManagement.mdinstructs the user to execute commands withsudo launchctl, which can lead to privilege escalation.Tools/AddBg.tsandTools/RemoveBg.tsusechild_process.execto run ImageMagick and shell commands with unsanitized file paths. This is a classic command injection vector if an attacker can influence file names.- External Downloads (MEDIUM): The skill downloads and updates resources from untrusted external sources at runtime.
Tools/fabric/update-patterns.shuses thefabricCLI to pull updates, and patterns are downloaded from untrusted GitHub accounts (e.g.,danielmiessler/fabric) as seen inTools/fabric/Patterns/extract_wisdom/README.md.- Indirect Prompt Injection (LOW): The skill has an extremely large attack surface for indirect prompt injection due to its complex toolset and ingestion of untrusted data.
- Ingestion Points:
Tools/ExtractTranscript.ts(audio files),Tools/extract-transcript.py(video/audio), and various Fabric patterns designed to process arbitrary text input. - Boundary Markers: Most patterns lack clear delimiters or instructions to ignore instructions embedded in the input data (e.g.,
Tools/fabric/Patterns/summarize/system.mdsimply appendsINPUT:). - Capability Inventory: The skill has access to subprocess spawning (
exec,spawn), file system writing (writeFile), and network access (fetch), providing powerful primitives for an exploit payload. - Sanitization: No evidence of input validation or escaping was found in the provided processing scripts.
Recommendations
- HIGH: Downloads and executes remote code from: https://claude.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata