NYC

giil

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • Remote Code Execution (CRITICAL): The skill uses curl | bash to execute a remote shell script directly from an untrusted repository (Dicklesworthstone/giil). This bypasses all security reviews and allows the remote author to execute any command on the user's system.
  • Evidence: curl -fsSL "https://raw.githubusercontent.com/Dicklesworthstone/giil/main/install.sh?v=3.0.0" | bash
  • External Downloads (HIGH): The skill downloads an external file and places it in a hidden local directory (~/.local/bin/) for execution. The source is not verified or part of the trusted whitelist.
  • Evidence: curl -fsSL https://raw.githubusercontent.com/Dicklesworthstone/giil/main/giil -o ~/.local/bin/giil
  • Command Execution (HIGH): The skill performs direct shell command execution to modify the local environment and install unverified software.
Recommendations
  • CRITICAL: Downloads and executes remote code from untrusted source(s): https://raw.githubusercontent.com/Dicklesworthstone/giil/main/giil, https://raw.githubusercontent.com/Dicklesworthstone/giil/main/install.sh?v=3.0.0 - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 11:12 PM