openwork-core
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Data Exposure] (MEDIUM): Accesses a sensitive SQLite database at
~/.opencode/opencode.dbwhich contains private session history, messages, and file change tracking. - Evidence: The skill explicitly instructs the agent to read from
~/.opencode/opencode.dband identifies tables likesessions,messages, andhistory. - Severity Note: Originally HIGH, but downgraded to MEDIUM as this access is the primary intended purpose of the core context skill.
- [External Downloads] (MEDIUM): Downloads and updates code from an untrusted GitHub organization.
- Evidence:
git clone https://github.com/anomalyco/opencodeandgit -C vendor/opencode pulltargetanomalyco, which is not on the list of trusted organizations. - [Command Execution] (MEDIUM): Executes shell commands that interpolate user input directly into a CLI tool.
- Evidence:
opencode -p "your prompt" -f json -qallows for command injection if the user prompt is not properly sanitized. - [Indirect Prompt Injection] (LOW): The skill possesses a surface for indirect prompt injection by processing external data and local history without explicit sanitization.
- Ingestion points: Reads from
~/.opencode/opencode.dband external code invendor/opencode. - Boundary markers: Absent; there are no instructions to ignore embedded commands in the database or files.
- Capability inventory: Subprocess calls via
pnpm,git, andopencode(SKILL.md). - Sanitization: Absent; no validation or escaping logic is described for data retrieved from the database or external repository.
Audit Metadata