jimubi-bigscreen
Fail
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill contains a hardcoded cryptographic signing secret (
dd05f1c54d63749eda95f9fa6d49v442a) used across multiple files includingbi_utils.py,datasource_ops.py, andproc_ops.pyto generate HMAC signatures for API requests. This secret should not be hardcoded in the skill code. - [CREDENTIALS_UNSAFE]: Hardcoded default database passwords (e.g.,
123456,root) are present inreferences/signing-datasource-guide.mdandreferences/dataset-guide.mdwithin example connection strings. - [COMMAND_EXECUTION]: The script
references/scripts/gen_all_comps.pyusessubprocess.runwithshell=Trueto interact with the system clipboard, which is a security risk if the input is not strictly controlled. - [COMMAND_EXECUTION]: Multiple scripts, including
references/scripts/proc_ops.pyandreferences/scripts/files_ops.py, construct SQL queries using string formatting (f-strings) with variables that may be derived from external data, posing a risk of SQL injection. - [EXTERNAL_DOWNLOADS]: The skill is configured to fetch GeoJSON map data from an external Alibaba Cloud service (
geo.datav.aliyun.com) inreferences/scripts/map_ops.pyandreferences/map-guide.md. - [PROMPT_INJECTION]: The skill utilizes a surface for indirect prompt injection as it processes data from external APIs and databases without explicit boundary markers or sanitization to prevent malicious instructions embedded in the data from influencing the agent's behavior (Category 8).
Recommendations
- AI detected serious security threats
Audit Metadata