app-store-screenshots
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The skill contains a piped shell command:
curl -fsSL https://cli.inference.sh | sh. This pattern is highly dangerous as it fetches a script from the internet and executes it immediately with the user's permissions, providing no opportunity for audit or integrity verification. - EXTERNAL_DOWNLOADS (HIGH): The skill references an external domain
inference.shwhich is not on the list of trusted GitHub organizations or repositories. Any content retrieved from this source is considered untrusted. - COMMAND_EXECUTION (MEDIUM): The skill requests access to the
Bashtool specifically to run theinfshcommand and the installation script. While required for the skill's stated purpose, it facilitates the critical RCE finding. - INDIRECT PROMPT INJECTION (LOW): The skill processes untrusted input strings through the
promptandinputfields in severalinfshtool calls (e.g., inSKILL.md). - Ingestion points:
promptfield in JSON objects passed toinfsh app run. - Boundary markers: Absent. Inputs are interpolated directly into shell command arguments.
- Capability inventory: Access to
Bashtool, network access viainfsh. - Sanitization: None detected in the static instructions.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata