find-skill
Fail
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill facilitates downloading code from external sources via
skillhub install <slug>and arbitrary GitHub repositories usingskillhub install-github <url>. These sources are outside the immediate control of the platform. - [REMOTE_CODE_EXECUTION]: After installation, the skill instructs the agent to load the newly acquired content using the
read_skillstool. This process executes the logic contained within the downloaded skills, effectively performing remote code execution of third-party content. - [COMMAND_EXECUTION]: The skill makes extensive use of
shell_execto run theskillhubCLI and internal Python scripts. It interpolates user-controlled variables like<keyword>,<slug>, and<code>directly into shell commands, which creates a significant surface for command injection attacks. - [CREDENTIALS_UNSAFE]: The script
scripts/_context.pyprogrammatically accesses sensitive local paths including.credentials/init_client_message.jsonand.chat_history/magic<main>.session.jsonto extract session metadata such astopic_id,project_id, andmodel_id. Accessing credential and history files is a high-risk operation.
Recommendations
- AI detected serious security threats
Audit Metadata