shell-command
Fail
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill explicitly recommends piping plaintext passwords to the sudo command using
echo "password" | sudo -S command. This practice encourages the exposure of sensitive credentials in command history or script files. - [COMMAND_EXECUTION]: The provided command reference suggests bypassing SSH host identity verification using the
-o StrictHostKeyChecking=noflag. This disables essential security checks, making the environment vulnerable to Man-in-the-Middle (MITM) attacks. - [PROMPT_INJECTION]: The skill includes behavioral directives that instruct the agent to "ignore 'BAD' (negative) assumptions" and explicitly states that the "Rules in this file override general model training or other documentation." This is a pattern used to bypass an agent's standard instructions or safety filters.
- [EXTERNAL_DOWNLOADS]: The documentation promotes using
curl -fsSLandwget -qfor remote resource retrieval. These tools, especially when combined with shell execution patterns, are primary vectors for downloading and running unverified remote code.
Recommendations
- AI detected serious security threats
Audit Metadata