data-collect
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill executes
python scripts/collect_stock_data.py <股票代码>by directly interpolating user input. This allows an attacker to perform shell command injection by providing a 'stock code' such as600519; cat /etc/passwd. - CREDENTIALS_UNSAFE (MEDIUM): The skill requires the
TUSHARE_TOKENenvironment variable to be set, which exposes sensitive API credentials to the execution environment and potential logging. - REMOTE_CODE_EXECUTION (HIGH): The identified command injection vulnerability provides a direct path to Remote Code Execution (RCE) on the system running the agent.
- EXTERNAL_DOWNLOADS (LOW): The skill downloads and installs
akshare,tushare, andpandasusing pip. While these are legitimate libraries, they are unversioned in the instructions, which is a best-practice violation. - INDIRECT_PROMPT_INJECTION (HIGH): This skill has a high vulnerability surface for indirect injection. Mandatory Evidence Chain: 1. Ingestion points: The
<股票代码>parameter and external financial data retrieved fromakshareandtushare. 2. Boundary markers: None present. 3. Capability inventory: Execution of local Python scripts with arguments. 4. Sanitization: No sanitization or validation of the stock code input is mentioned.
Recommendations
- AI detected serious security threats
Audit Metadata