grok-search

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • External Downloads (HIGH): The README instructions to clone a repository from an untrusted GitHub account (Frankieli123) or download a ZIP file to install the skill represent a high risk of executing unverified code.
  • Remote Code Execution (HIGH): The installer scripts (install.sh and install.ps1) perform file system modifications based on an untrusted source. The main functional script (scripts/grok_search.py) is missing from the provided package, meaning the core logic that interacts with the network and processes external data cannot be verified for malicious behavior.
  • Prompt Injection (MEDIUM): The skill is highly susceptible to indirect prompt injection (Category 8). Evidence: 1. Ingestion points: Real-time web data fetched via a Grok-compatible API. 2. Boundary markers: No delimiters or ignore-instructions warnings are present in the skill metadata or instructions. 3. Capability inventory: The agent is instructed to use this tool for sensitive tasks like retrieving package installation commands and API documentation. 4. Sanitization: Not verifiable due to the absence of the primary search script.
  • Credentials Unsafe (MEDIUM): The file config.example.json contains a hardcoded API key string (asd3865373). While likely intended as a dummy value, the use of non-standard placeholders is a security risk.
  • Command Execution (MEDIUM): The installation and configuration documentation recommends using -ExecutionPolicy Bypass for PowerShell scripts, which bypasses local security policies and allows the execution of unsigned code.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:37 PM