gsd-oc-select-model
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/select-models.cjsis vulnerable to shell command injection. It uses theexecSyncfunction to runopencode models "${provider}", where theproviderandsub-providervariables are taken directly from CLI arguments without sanitization. Since these arguments are populated from user input via the agent's interactive selection tool (which includes a "Type your own answer" option), an attacker can execute arbitrary system commands by injecting shell metacharacters such as;,&,|, or backticks. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface. 1. Ingestion points: User responses are collected through the question tool as specified in
SKILL.md(Steps 2, 4, and 5). 2. Boundary markers: None; the skill does not use delimiters or instructions to prevent the agent from obeying instructions embedded in user-supplied strings. 3. Capability inventory: The skill can execute system commands via its bundled Node.js script. 4. Sanitization: No input validation or shell-escaping is performed before the user-supplied strings are interpolated into system commands.
Recommendations
- AI detected serious security threats
Audit Metadata