infsh-cli
Fail
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides instructions to install its core CLI tool by piping a remote shell script directly into a shell environment.
- Evidence:
curl -fsSL https://cli.inference.sh | sh(found inSKILL.md,references/authentication.md, andreferences/cli-reference.md). - Context: The source domain is owned by the author 'inference-sh-8'.
- [DATA_EXFILTRATION]: The
infshtool is designed to automatically upload local files when paths are provided in input arguments, creating a potential path for sensitive data exposure. - Evidence: 'The CLI automatically uploads local files when you provide a path instead of a URL' (found in
SKILL.mdandreferences/running-apps.md). - Risk: Malicious prompts could trick the agent into specifying sensitive file paths (e.g.,
~/.ssh/id_rsa) as input, causing them to be uploaded to the cloud platform. - [PROMPT_INJECTION]: The skill serves as an interface for processing external data through third-party AI models without explicit boundary markers, presenting an indirect prompt injection surface.
- Ingestion points: Untrusted prompt data enters the execution context via the
--inputargument ininfsh app runcommands (found inSKILL.md). - Boundary markers: Absent; user input is interpolated directly into command-line arguments.
- Capability inventory: The skill uses
Bash(infsh *)to interact with numerous applications, including tools for web search and social media automation. - Sanitization: No evidence of validation or sanitization of external content before it is passed to the CLI.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
Audit Metadata