sysadmin-toolbox
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script
scripts/refresh.shis designed to clone the repositoryhttps://github.com/trimstray/the-book-of-secret-knowledge.gitand overwrite internal skill reference files with the downloaded content. - [COMMAND_EXECUTION]: The skill provides a vast collection of powerful and potentially dangerous shell commands in
references/shell-oneliners.mdandreferences/shell-tricks.md. Notable examples include bind shells (nc -l 5000 -e /bin/bash), reverse shells using named pipes, and commands for modifying/etc/profileor truncating system files. - [REMOTE_CODE_EXECUTION]: The self-update mechanism in
scripts/refresh.shpresents a supply-chain risk. Because the skill fetches and extracts text from an external 3rd-party source to populate its own reference files, a compromise of that remote source could result in the delivery of malicious instructions that an agent might subsequently recommend or attempt to execute. - [DATA_EXFILTRATION]: The functions
DomainResolveandGetASNinreferences/shell-tricks.mdusecurlto transmit hostnames and IP addresses to external services (dns.google.comandip-api.com). While intended for diagnostics, this patterns represents a data exposure surface. - [PROMPT_INJECTION]: The
SKILL.mdfile contains instructions in the 'Operational Gotchas' section that direct the agent to use specific execution methods like/bin/bash -lcor a Python ThreadPool for parallel operations, which functions as a low-level attempt to override default agent execution behavior.
Audit Metadata