office-hours
Fail
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes logic to download an installation script from
https://bun.sh/installand execute it viabash. Although it performs a SHA256 checksum verification, this remains a remote code execution pattern. - [COMMAND_EXECUTION]: The skill executes multiple local binaries stored in
~/.claude/skills/gstack/bin/to manage configuration, telemetry, and session metadata. - [COMMAND_EXECUTION]: Employs dynamic execution patterns such as
evalandsource <(...)on the output of local commands and binaries. - [DATA_EXFILTRATION]: Transmits telemetry and analytics (usage statistics, repository names) to external services via a dedicated logging binary.
- [EXTERNAL_DOWNLOADS]: Fetches the Bun installer from its official domain and downloads documentation from
garryslist.org. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection by ingesting untrusted data from the repository (CLAUDE.md, TODOS.md, git logs) and web search results.
- Ingestion points: Reads
CLAUDE.md,TODOS.md, git logs, andWebSearchresults. - Boundary markers: None identified in the processing logic for these inputs.
- Capability inventory: Uses
Bashfor command execution, plusWrite,Edit, andopenfor file and browser operations. - Sanitization: No evidence of content sanitization or validation before interpolation into the agent's context.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata