ghost-scan-secrets
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): In
agents/init/agent.md, the skill executes a remote script using thecurl | bashpattern. This is a critical security risk as it runs unverified code from the internet directly in the agent's environment. - [EXTERNAL_DOWNLOADS] (HIGH): The installer script is fetched from
https://raw.githubusercontent.com/ghostsecurity/poltergeist/main/scripts/install.sh. The 'ghostsecurity' organization is not on the Trusted External Sources list, making this download unverified. - [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) due to its core logic of reading untrusted codebases.
- Ingestion points:
agents/analyze/analyzer.mdreads arbitrary file content from the<repo_path>for analysis. - Boundary markers: Absent. The prompt instructions do not provide delimiters or warnings to the analyzer agent to ignore instructions embedded within the data being scanned.
- Capability inventory: The analyzer agent has the capability to write finding files to the disk (
scan_dir/findings/), which could be manipulated by an attacker to create deceptive security reports. - Sanitization: Absent. There is no evidence of filtering or escaping content read from the repository files before it is processed by the AI agent.
- [COMMAND_EXECUTION] (SAFE): The skill uses standard bash commands in
SKILL.mdandagents/scan/agent.mdto identify the repository context and execute the localpoltergeistbinary. These operations are consistent with the skill's stated purpose.
Recommendations
- AI detected serious security threats
Audit Metadata