substracker
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill allows passing highly sensitive secrets as command-line arguments.
- Evidence: In
scripts/config.tsandscripts/notifications.ts, sensitive fields such asADMIN_PASSWORD,TG_BOT_TOKEN,RESEND_API_KEY, andGOTIFY_APP_TOKENare accepted as CLI flags. When the agent executes these commands (e.g.,bun scripts/main.ts c update --tg-bot-token "..."), the secrets become visible to any user on the system via process monitoring tools likeps. - [DATA_EXFILTRATION]: The skill accesses sensitive local files and stores session data in an insecure location.
- Evidence:
scripts/client.tsreads from~/.substracker-skills/.env, which is used to store theSUBSTRACKER_PASS. - Evidence:
scripts/client.tsstores the session cookie in/tmp/substracker_cookie.txt. On multi-user systems, the/tmpdirectory is often world-readable, potentially allowing other users to hijack the SubsTracker session. - [COMMAND_EXECUTION]: The skill's primary interface is the execution of TypeScript files via the Bun runtime.
- Evidence:
SKILL.mddefines several commands that involve spawning subprocesses to runbun scripts/main.ts, which grants the agent the capability to execute code on the host machine.
Audit Metadata