admin-unix
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches installation scripts for the
uvpackage manager fromastral.shand Homebrew from GitHub. These are well-known technology services and are used here for legitimate environment setup. - [COMMAND_EXECUTION]: Executes administrative commands using
sudofor package management (apt, dnf) and service management (systemd). These operations are consistent with the skill's stated purpose of Unix administration. - [PROMPT_INJECTION]: The skill reads configuration data from local JSON profile files located at
~/.admin/profiles/. This creates a surface for indirect prompt injection where variables could be manipulated if the local files are modified by an attacker. However, the risk is low and inherent to configuration-driven management. - Ingestion points:
~/.admin/profiles/{hostname}.jsonread viajqinSKILL.mdandverify-unix-environment.sh. - Boundary markers: None identified; variables are interpolated directly into shell commands.
- Capability inventory: High-privilege access including
sudo,ssh, and system package managers across all scripts. - Sanitization: No explicit validation or sanitization of profile fields before use in shell execution.
Audit Metadata