linkedin-content
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill documentation includes a command that downloads and executes a shell script from a remote URL to install the vendor's CLI tool.
- Evidence:
curl -fsSL https://cli.inference.sh | shinSKILL.md. - Context: The download targets a domain associated with the skill's author.
- [COMMAND_EXECUTION]: The skill utilizes the
infshcommand-line utility to perform various tasks, including logging in, executing research agents, and generating visual content. - Evidence: Multiple instances of
infsh app runandinfsh logininSKILL.md. - [PROMPT_INJECTION]: The skill is configured to interpolate user-provided content directly into shell command arguments, which serves as a surface for indirect prompt injection.
- Ingestion points: The
--inputJSON payload in variousinfsh app runcommands withinSKILL.md. - Boundary markers: Input data is structured within JSON strings.
- Capability inventory: The
infshtool can perform network operations and interact with external APIs. - Sanitization: No explicit sanitization or input validation logic is described in the provided skill instructions.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
Audit Metadata