skill-publisher
Warn
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/publish_skill.pyis vulnerable to command injection. It usessubprocess.run(shell=True)and interpolates variables directly into shell commands using data extracted from theSKILL.mdfile of the skill being published. A malicious user could craft a skill with a name or description containing shell metacharacters (e.g.,; rm -rf /) to execute arbitrary code when the publishing script runs. - [EXTERNAL_DOWNLOADS]: The skill invokes
npxto run theskillsutility, which involves downloading and executing code from a remote registry. It also requires theghCLI for interacting with GitHub's API. - [COMMAND_EXECUTION]: The script modifies the user's home directory by creating symbolic links in
~/.agents/skills/. This is a shared directory used by multiple AI agent tools, and automatic modifications could lead to unauthorized configuration changes across different platforms.
Audit Metadata