eve-cli-primitives
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- DATA_EXFILTRATION (HIGH): The skill documentation explicitly includes examples that access sensitive file paths. Specifically, the command
eve profile set --default-ssh-key ~/.ssh/id_ed25519references a private SSH key, which could lead to unauthorized data exposure or exfiltration if an agent executes or reveals the contents of this path. - DATA_EXFILTRATION (LOW): The skill targets a non-whitelisted external API domain (
https://api.eh1.incept5.dev) via theeve profile createcommand. While not inherently malicious, it establishes a network communication path outside of trusted domains. - CREDENTIALS_UNSAFE (LOW): The skill provides primitives for managing secrets (
eve secrets set) and integrations (eve integrations slack connect). While the examples use placeholders likexoxb-test, the primary purpose of these commands is the handling of sensitive authentication material, which increases the risk of credential exposure if handled incorrectly by the agent. - PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: Untrusted data enters the agent context through CLI arguments such as
--inputs,--body,--text, and--input(found inSKILL.md). - Boundary markers: None are present in the examples to delimit untrusted input from system instructions.
- Capability inventory: The skill allows for command execution (via
eveCLI), file system reference (SSH keys), and network operations (API calls). - Sanitization: No sanitization or validation of the external content is mentioned or demonstrated.
Recommendations
- AI detected serious security threats
Audit Metadata