omu
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Script
scripts/install.shdownloads a remote shell script fromhttps://plannotator.ai/install.shand executes it directly by piping thecurloutput intobash. This pattern executes unverified remote code with the user's local privileges. - [COMMAND_EXECUTION]: Setup scripts (
setup-claude.sh,setup-codex.sh,setup-gemini.sh,setup-opencode.sh) perform automated modifications to local configuration files for various AI tools (e.g.,~/.claude/settings.json,~/.codex/config.toml) and install persistent executable hooks (~/.codex/hooks/omu-notify.py,~/.gemini/hooks/omu-plannotator.sh). - [EXTERNAL_DOWNLOADS]:
scripts/install.shperforms global installations of NPM packages (agent-browser,playwriter) and usesbunxornpxto fetch and run setup code from external sources likeoh-my-opencodeandoh-my-agwithout version pinning. - [PROMPT_INJECTION]: The skill architecture is susceptible to indirect prompt injection via the
plan.mdfile processed by the planning loop. Ingestion point:plan.md. Boundary markers: Absent. Capability inventory: High, including shell execution and configuration modification. Sanitization: Absent. Instructions embedded in the plan could manipulate the agent's logic during execution transitions.
Recommendations
- HIGH: Downloads and executes remote code from: https://plannotator.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata