install-stack
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill uses
https://ghfast.topas a mirror for cloning repositories inscripts/detect_network.pyandreferences/network-mirrors.md. This domain has been identified as malicious by automated scanners and is not a verified or trusted source for code distribution. - [COMMAND_EXECUTION]: Several scripts, including
scripts/collect_env_info.pyandscripts/detect_network.py, usesubprocess.runto execute shell commands for system discovery. TheSKILL.mdalso instructs the agent to usedocker execfor various installation and configuration tasks. - [REMOTE_CODE_EXECUTION]: Clones and installs packages from external sources (including an untrusted mirror) using
pip install -e ., which allows the execution of arbitrary code during the installation process through setup scripts. - [DATA_EXFILTRATION]: Collects environment information like GPU details, glibc versions, and architecture from the container to inform installation logic, which is then processed by the agent.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points: JSON outputs from discovery scripts and external Git repository content. Boundary markers: Absent. Capability inventory:
docker exec,Bash(*),Write. Sanitization: Absent.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata