braiins-toolbox
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The documentation specifies a
--passwordglobal flag for providing device credentials via the CLI (references/user-interface.md). This practice is insecure as passwords can be exposed in process lists, shell history, and logs. - [REMOTE_CODE_EXECUTION] (HIGH): The skill provides instructions for the
system executecommand (references/limitations.md) andfirmware install(references/quick-start.md). These allow for the execution of arbitrary code and the installation of new operating systems on remote network devices. - [COMMAND_EXECUTION] (MEDIUM): The tool is designed to execute various system-level operations including network scanning, system reboots, and service management on mining hardware.
- [DATA_EXFILTRATION] (LOW): The tool can write data to local files via the
--outputand--logfile-pathoptions, which could be misused if the agent is misdirected to write to sensitive locations. - [INDIRECT_PROMPT_INJECTION] (HIGH): Vulnerability surface identified: 1. Ingestion points:
scancommand (network) and--ip-file(local files); 2. Boundary markers: Absent; 3. Capability inventory:system executeandfirmware install(references/limitations.md, references/quick-start.md); 4. Sanitization: Not documented. Malicious data from scanned devices could influence high-privilege agent actions.
Recommendations
- AI detected serious security threats
Audit Metadata