technical-blog-writing
Fail
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation provides an installation command
curl -fsSL https://cli.inference.sh | sh. This is a vendor-provided script for setting up the necessary CLI environment and originates from the author's official domain. - [COMMAND_EXECUTION]: The skill uses the
infshCLI to run various applications, such asinfsh/python-executorfor data visualization andinfsh/html-to-imagefor generating blog assets. These are controlled executions of vendor-signed tools. - [EXTERNAL_DOWNLOADS]: The skill references downloading binaries and checksums from
dist.inference.shas part of its setup instructions, which is a standard distribution method for this vendor. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it processes external data from
exa/searchto inform blog content. • Ingestion points: Data fromexa/searchis ingested to research topics. • Boundary markers: No delimiters are specified to isolate untrusted search content from instructions. • Capability inventory: The skill has access to tools that execute code, generate files, and interact with external APIs (X/Twitter). • Sanitization: There is no evidence of content filtering or sanitization of search results.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
Audit Metadata