giil
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (CRITICAL): The skill uses
curl | bashto execute a remote shell script directly from an untrusted repository (Dicklesworthstone/giil). This bypasses all security reviews and allows the remote author to execute any command on the user's system. - Evidence:
curl -fsSL "https://raw.githubusercontent.com/Dicklesworthstone/giil/main/install.sh?v=3.0.0" | bash - External Downloads (HIGH): The skill downloads an external file and places it in a hidden local directory (
~/.local/bin/) for execution. The source is not verified or part of the trusted whitelist. - Evidence:
curl -fsSL https://raw.githubusercontent.com/Dicklesworthstone/giil/main/giil -o ~/.local/bin/giil - Command Execution (HIGH): The skill performs direct shell command execution to modify the local environment and install unverified software.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://raw.githubusercontent.com/Dicklesworthstone/giil/main/giil, https://raw.githubusercontent.com/Dicklesworthstone/giil/main/install.sh?v=3.0.0 - DO NOT USE
- AI detected serious security threats
Audit Metadata