wiki-init
Fail
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill clones a repository from
https://github.com/tobi/qmd.gitand executesbun installfollowed bybun run build. This involves executing third-party code from an unverified source at runtime. - Evidence is located in
scripts/wiki-init.tswithin theensureManagedQmdCheckoutfunction. - [EXTERNAL_DOWNLOADS]: The installation process fetches software components from an external GitHub repository.
- Defined in
scripts/wiki-init.tsvia theqmdRepoUrlconstant. - [COMMAND_EXECUTION]: The skill makes extensive use of system commands and subprocesses to perform installation and auditing tasks.
- Uses
Bun.spawnto run generated shell scripts intemplates/opencode-plugin.js.tmpl. - Uses
execFileSyncto rungit,bun, andbashcommands inscripts/wiki-init.ts. - Automatically sets executable permissions on generated files using
chmod 0o755. - Generates multiple script files from templates and stores them on the local filesystem.
Recommendations
- AI detected serious security threats
Audit Metadata