skill-finder
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
add_skill.pyscript downloads Python scripts and markdown instructions from external GitHub repositories and saves them locally. These scripts are intended for immediate registration and execution by the agent, allowing for the deployment of unverified third-party code. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to
skills.shfor search queries and toapi.github.comandraw.githubusercontent.comto retrieve repository metadata and raw file contents. - [COMMAND_EXECUTION]: The script writes downloaded files to the local filesystem using
os.makedirsandopen().write(). It does not perform sufficient path validation, making it vulnerable to path traversal attacks if a malicious repository contains file paths or skill names with..sequences, potentially allowing it to overwrite system files. - [CREDENTIALS_UNSAFE]: The script accesses the
GITHUB_TOKENenvironment variable to authenticate requests to the GitHub API. This sensitive credential is used to interact with external services and could be exposed if the skill's environment is compromised. - [PROMPT_INJECTION]: The
SKILL.mdfile contains instructions with 'CRITICAL' markers that attempt to override the agent's default tool-calling behavior and interaction flow, specifically regarding how it handles user confirmation before executing tools.
Recommendations
- AI detected serious security threats
Audit Metadata