openwork-debug
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure (HIGH): The skill accesses
~/.opencode/opencode.dbusingsqlite3. This database contains sensitive user data, specifically chat history (messages) and session metadata, exposing it to the agent's context. - Data Exfiltration (MEDIUM): The skill utilizes
curlto perform network requests to an external, user-defined$OPENWORK_SERVER_URLwith authorization headers. This provides a potential channel for exfiltrating the sensitive data retrieved from the local database. - Command Execution (MEDIUM): The skill instructs the agent to execute several system commands, including
curl,sqlite3, andopencode. This creates a surface for command injection if variables like$OPENWORK_SERVER_URLare maliciously populated. - Indirect Prompt Injection (LOW): The skill processes untrusted data from external server responses and local database records.
- Ingestion points: Output of
curlnetwork calls andsqlite3database queries (File: SKILL.md). - Boundary markers: Absent; there are no instructions to the agent to ignore or delimit embedded instructions within the retrieved data.
- Capability inventory: File system read access via
sqlite3, network access viacurl, and CLI interaction viaopencode. - Sanitization: None; the skill does not include steps to sanitize or validate the external data before processing.
Recommendations
- AI detected serious security threats
Audit Metadata