runninghub
Fail
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The core scripts
runninghub.pyandrunninghub_app.pyinclude logic in theresolve_mediaandupload_filefunctions that reads local files from paths provided as arguments and uploads them tohttps://www.runninghub.cn. An attacker could exploit this by tricking the agent into 'processing' sensitive system files (e.g.,.env,~/.ssh/id_rsa), resulting in the exfiltration of private data to an external API.\n- [COMMAND_EXECUTION]: The skill uses the Pythonsubprocess.runmodule to executecurlcommands for network interactions. While these calls use argument lists to mitigate direct shell injection, they execute external processes based on user-supplied parameters mediated by the agent, representing a significant capability surface.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted user prompts and file paths without isolation or validation.\n - Ingestion points: User prompts in
SKILL.mdand file paths provided to the--image,--video, and--audioscript arguments.\n - Boundary markers: No delimiters or isolation markers are used to distinguish instructions from untrusted data.\n
- Capability inventory: Shell command execution (via
curl), arbitrary file reading (via media upload), and binary file modification (via thefix_mov_to_mp4function).\n - Sanitization: No input sanitization, path validation, or instruction filtering is performed on data before it is passed to sensitive system functions.
Recommendations
- AI detected serious security threats
Audit Metadata