islamic-companion
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- CREDENTIALS_UNSAFE (HIGH): A hardcoded API key was detected in the auto-generated configuration file.
- Evidence: File
config.bashcontainsZAKAT_API_KEY="${ZAKAT_API_KEY:-k8090qKpozfSNHV8MvODYtbK8E24M1yveTiAXh0zipjzDtdF}". Hardcoding credentials in source files or generated scripts is a major security risk. - COMMAND_EXECUTION (HIGH): The skill is vulnerable to command injection through the dynamic generation of
config.bashfromconfig.json. - Evidence: In
lib/config.sh, values extracted fromconfig.json(likecalculation.method) are interpolated directly into a heredoc that createsconfig.bash. This generated file is thensourced by the application. An attacker providing a malicious value inconfig.json(e.g.,20"; rm /tmp/test; ") could execute arbitrary shell commands. - DATA_EXFILTRATION (LOW): The skill makes numerous network requests to external Islamic utility APIs.
- Evidence: Requests are made to
api.aladhan.com,islamicapi.com,ilm.islamic.network, andapi.alquran.cloud. While these are legitimate for the skill's purpose, they represent a data egress point for the parameters sent (location coordinates, search terms). - PROMPT_INJECTION (LOW): The skill handles Quran search results and quotes from external APIs which could potentially contain indirect prompt injections.
- Evidence: Files
src/quran_search.pyandlib/quran.shprocess text from external sources. If these APIs were compromised, malicious instructions could be presented to the agent. No sanitization of these outputs is present. - DATA_EXFILTRATION (LOW): The skill generates persistence instructions (
CRON_ADD) for scheduling prayer reminders. - Evidence: Found in
src/scheduler.pyandlib/scheduler.sh. While this is the primary purpose of the feature, users should review generated cron jobs to ensure they do not perform unauthorized actions.
Recommendations
- AI detected serious security threats
Audit Metadata