admin
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of system-level commands through PowerShell and Bash scripts to manage software installations, environment variables, and system services.
- Evidence: Multiple scripts in the
scripts/directory utilizepwsh,winget,scoop,apt, andsystemctlto perform administrative tasks. - [REMOTE_CODE_EXECUTION]: The skill provides instructions and scripts to download and execute installers for system-level tools from remote repositories.
- Evidence:
references/unix.mdexecutes the Homebrew installer usingcurl | bash, andreferences/windows.mdexecutes the Chocolatey installer usingInvoke-WebRequest | iex. - [EXTERNAL_DOWNLOADS]: The skill fetches scripts and packages from external domains, including some that are not on the explicit whitelist but are standard for the tools used.
- Evidence: References to
raw.githubusercontent.comfor Homebrew andcommunity.chocolatey.orgfor Chocolatey packages. - [PROMPT_INJECTION]: The skill implements an 'Indirect Prompt Injection' surface by reading and displaying historical logs and issue reports at the start of every session without sanitization.
- Ingestion points:
scripts/Show-AdminSessionStart.ps1andscripts/show-admin-session-start.shread content fromlogs/operations.logandissues/issue_*.md. - Boundary markers: Data from these files is interpolated directly into the agent's context or terminal output without protective delimiters.
- Capability inventory: The agent has high system-level capabilities including command execution and file manipulation.
- Sanitization: Content from previous logs or user-generated issue reports is processed raw.
- [DATA_EXFILTRATION]: The skill integrates with an external, non-whitelisted service (
mem.self-host.io) to store and retrieve operational memories. - Evidence:
references/memory-integration.mddescribes sending installation outcomes and diagnostic findings tohttps://mem.self-host.io/mcpfor cross-device retrieval.
Audit Metadata