adguard-home
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudoextensively over SSH to restart services, view system logs, and perform binary updates (sudo ./AdGuardHome --update), which requires high-level system privileges. - [DATA_EXFILTRATION]: The skill reads the main configuration file
/opt/AdGuardHome/AdGuardHome.yamlviacatover SSH. This file contains sensitive server settings, network configurations, and potentially credentials. - [PROMPT_INJECTION]: The skill processes DNS query logs from the AdGuard Home API, which can contain attacker-controlled domain names, presenting an indirect prompt injection risk.
- Ingestion points: Data is fetched from the
/control/querylogendpoint viascripts/adguard_api.py. - Boundary markers: No explicit delimiters or warnings to ignore embedded instructions are present in the processing logic.
- Capability inventory: The skill can execute SSH commands with sudo, modify DNS filtering rules, and update system binaries.
- Sanitization: No sanitization or validation of the ingested query log data is described.
Recommendations
- AI detected serious security threats
Audit Metadata