openstoryline-install
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
sudo apt-getto install system-level dependencies such asffmpeg,wget, andunzip. This requires the agent to execute commands with elevated administrative privileges. - [REMOTE_CODE_EXECUTION]: The installation process involves running
bash download.shfrom the cloned repository. Executing shell scripts from an external source checkout without verifying their contents presents a high risk of executing arbitrary code. - [EXTERNAL_DOWNLOADS]: The skill triggers several external downloads, including system packages via OS package managers, Python libraries via
pip install -r requirements.txt, and large resource archives (models and assets) viawgetwithin thedownload.shscript. - [CREDENTIALS_UNSAFE]: The workflow involves updating
config.tomlwith sensitive API keys for LLM and VLM services. While placeholders likeREPLACE_WITH_REAL_KEYare shown, the functional purpose of the skill is to handle and store real secrets in a local file. - [PROMPT_INJECTION]: The skill is designed to read
README.mdand other local repository files before proceeding. This creates a surface for indirect prompt injection where malicious instructions embedded in the repository files could manipulate the agent's installation or configuration behavior. This represents an ingestion point for untrusted data combined with powerful capabilities like subprocess execution.
Recommendations
- AI detected serious security threats
Audit Metadata