github-workflow
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill parses user-provided URLs to extract a
<task_id>and interpolates it into a shell command defined in~/.bonfire/source.json. Step 1.1 and 1.2 describe executing these commands (e.g.,node ... query.mjs get <task_id>). A maliciously crafted URL containing shell metacharacters (e.g.,https://clickup.com/t/$(rm -rf $HOME)) could lead to arbitrary command execution if the parsing logic is not strictly sanitized. - EXTERNAL_DOWNLOADS (MEDIUM): The skill's 'Prerequisites' section directs users to install a GitHub CLI skill using
npx skills add hairyf/skills. The sourcehairyf/skillsis not a verified or trusted organization, representing a supply chain risk where the agent might download and execute untrusted third-party code. - REMOTE_CODE_EXECUTION (MEDIUM): The skill utilizes
npx skills findto dynamically discover and confirm 'query methods' from the internet or local environment. These discovered commands are then saved to a persistent configuration file (~/.bonfire/source.json) and executed automatically in future sessions. This pattern allows for persistent execution of potentially malicious commands discovered via an unverified search process.
Recommendations
- AI detected serious security threats
Audit Metadata