ruff-dev
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (CRITICAL): The file
references/installation.mdpromotes the use of piped remote execution patterns:curl -LsSf https://astral.sh/ruff/install.sh | shandpowershell -c "irm https://astral.sh/ruff/install.ps1 | iex". These are critical security risks because they execute unverified remote code, and the source domainastral.shis not included in the analyzer's list of Trusted External Sources. - Indirect Prompt Injection (HIGH): The skill implements a significant vulnerability surface through its included maintenance scripts. Ingestion points:
scripts/discover_ruff_docs.pyandscripts/bulk_scrape_ruff.pyperform network requests to crawl and scrape content fromdocs.astral.sh. Boundary markers: Absent. Capability inventory: The scripts possess network access and file-write capabilities (os.makedirs,open().write). Sanitization: Absent. No sanitization or filtering is performed on the scraped content beyond basic HTML tag removal. Severity Reasoning: High risk because the ingestion of external data is paired with the capability to modify the local file system, allowing a compromise of the documentation source to influence the agent's environment. - Privilege Escalation (HIGH):
references/installation.mdsuggests the use ofsudofor system package installation (sudo zypper install python3-ruff), which involves unnecessary elevation of privileges. - Command Execution (LOW): The skill instructions frequently guide the agent to execute
ruffcommands. While this is the intended functionality, it relies on subprocess execution of a tool that is installed from an external source.
Recommendations
- AI detected serious security threats
Audit Metadata