security-secrets
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- COMMAND_EXECUTION (HIGH): The
scripts/scan-all.shscript is vulnerable to shell command injection via the$DIRparameter. It usesevalto process a condition string built from this unsanitized input. An attacker can execute arbitrary commands by providing a directory name containing shell metacharacters (e.g.,'; touch /tmp/pwned; #'). - CREDENTIALS_UNSAFE (HIGH): The
scripts/scan.shscript prints the raw, unredacted lines containing detected secrets directly to standard output. While theSKILL.mdspecifies a mandatory redaction format (showing only the first and last 4 characters), the implementation usesgreporripgrepto output the full secret, leading to sensitive data exposure in the agent's logs. - COMMAND_EXECUTION (MEDIUM):
scripts/scan-all.shattempts to execute scripts from hardcoded paths in the user's home directory (~/.config/opencode/skill/). This creates a dependency on external files and could lead to the execution of untrusted code if an attacker can manipulate files in those locations.
Recommendations
- AI detected serious security threats
Audit Metadata