twitter-thread-creation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill instructs the user or agent to run
curl -fsSL https://cli.inference.sh | sh. This pattern executes unverified remote code directly in the shell. The source domaininference.shis not included in the trusted provider list, making this a high-risk operation.\n- [COMMAND_EXECUTION] (MEDIUM): The skill is configured withallowed-tools: Bash(infsh *), which permits the execution of arbitrary shell commands. While intended for functionality, this broad access increases the impact of potential exploits.\n- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill usesnpx skills addto download additional executable components from theinferenceshorganization on GitHub, which is not a verified trusted source.\n- [INDIRECT_PROMPT_INJECTION] (LOW): The skill provides a surface for indirect prompt injection attacks.\n - Ingestion points: Data retrieved from external sources via
tavily/search-assistantandinfsh/agent-browser(web browsing).\n - Boundary markers: None identified in the prompt templates or command structures to separate instructions from data.\n
- Capability inventory: Social media posting (
x/post-create), image generation (html-to-image), and shell execution (Bash).\n - Sanitization: No evidence of input validation or escaping for the data fetched from external URLs or search results.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata