security-skill-scanner
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- CREDENTIALS_UNSAFE (HIGH): The file
moltbook-monitor.shcontains a hardcoded API key (MOLTBOOK_API_KEY) used for authenticated requests to an external service. - REMOTE_CODE_EXECUTION (HIGH): The script
moltbook-monitor.shfetches remote JSON data viacurland pipes it directly into a dynamicpython3 -cexecution block, creating a risk if the remote source is compromised. - COMMAND_EXECUTION (HIGH): The skill utilizes
subprocessininstall-hook.pyand direct shell execution ininstall-skill.shto perform system-level operations. - PERSISTENCE (HIGH): The
README.mdandSKILL.mdfiles provide instructions to modify the user's~/.bashrcto intercept themolthubcommand and to addcrontabentries, which are techniques used to maintain unauthorized access or control. - DATA_EXFILTRATION (MEDIUM): The scanner reads sensitive files (like
.envfiles in other skill directories) and performs network operations tomoltbook.com, which could be used to exfiltrate discovered secrets. - INDIRECT_PROMPT_INJECTION (LOW): 1. Ingestion points:
skill-scanner.pyandinstall-hook.pyread all contents of target skills. 2. Boundary markers: Absent. 3. Capability inventory:subprocessexecution and file read/write. 4. Sanitization: Absent. This creates a surface where malicious instructions in a scanned skill could influence the scanner's logic.
Recommendations
- AI detected serious security threats
Audit Metadata