tree-view
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
execSyncto execute a shell command that interpolates theDEPTHenvironment variable without sanitization or validation. If an attacker can control environment variables in the agent's runtime, they could execute arbitrary shell commands. Evidence found incli.ts:const depth = process.env.DEPTH || "2";followed byexecSync(DEPTH=${depth} python3 "${tempFile}", ...).- [COMMAND_EXECUTION]: The skill dynamically generates a Python script from a hardcoded string, writes it to the local file system in a temporary directory, and then executes it. This dynamic code generation and execution pattern increases the attack surface and complicates static security auditing. Evidence found incli.tswherepythonScriptis written totempFileand subsequently executed.
Audit Metadata