linkedin-content
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (HIGH): The skill includes the command
curl -fsSL https://cli.inference.sh | sh. This pattern downloads a script from an untrusted domain and executes it immediately with shell privileges, providing a direct path for arbitrary code execution on the host system. - Unverifiable Dependencies (MEDIUM): The skill uses
npx skills addto fetch and install additional remote content from theinference-sh/skillsrepository. These dependencies are not from a trusted organization and represent an unverified supply chain risk. - Indirect Prompt Injection Surface (LOW): The skill uses
infsh app run tavily/search-assistantto ingest external web data. - Ingestion points: Web search results via Tavily.
- Boundary markers: Absent; the content is processed without clear delimiters to isolate untrusted data.
- Capability inventory: The skill can execute bash commands and post to social media (X/Twitter), creating a path for malicious data to trigger actions.
- Sanitization: No sanitization or validation logic is defined for the ingested search data.
- Command Execution (LOW): The skill requests broad
Bash(infsh *)permissions, allowing the agent to execute any sub-command of the custominfshCLI tool.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata