clinvar-database
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Remote Code Execution] (HIGH): The file
references/api_reference.mdcontains a command to download and execute a shell script from a remote FTP server usingsh -c "$(curl -fsSL ...)". This pattern is a major security risk as it can be used to execute arbitrary malicious code on the host system. While the source is a government institution (NCBI), it is not within the explicitly defined trusted organizations and the execution pattern itself is unsafe. - [Indirect Prompt Injection] (LOW): The skill facilitates the ingestion of external clinical variant data from the NCBI API.
- Ingestion points: REST API responses from
eutils.ncbi.nlm.nih.gov. - Boundary markers: Absent; the documentation does not suggest using delimiters to separate data from instructions.
- Capability inventory: The skill uses
curland Python'sBiopythonlibrary to fetch and process data, and it includes instructions for shell-based tool installation. - Sanitization: No mention of input validation or sanitization for the retrieved API data, which could contain malicious content targeting the downstream agent.
Recommendations
- AI detected serious security threats
Audit Metadata