senhasegura-skill
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): Multiple CI/CD workflow files (Azure Pipelines, GitHub Actions, and GitLab CI) download a binary directly from a non-trusted GitHub repository (
github.com/senhasegura/dsmcli) without any checksum or signature verification.\n - Evidence:
curl -LO https://github.com/senhasegura/dsmcli/releases/latest/download/dsm-linux-amd64insamples/ci-cd/azure-pipelines.yaml,samples/ci-cd/github-actions.yaml, andsamples/ci-cd/gitlab-ci.yaml.\n- [REMOTE_CODE_EXECUTION] (HIGH): The scripts grant execution permissions to the downloaded binary and execute it immediately, which is a classic remote code execution vector if the download source or transit is compromised.\n - Evidence:
chmod +x dsm-linux-amd64followed bydsm --versionanddsm runbacross the CI/CD samples.\n- [COMMAND_EXECUTION] (HIGH): The installation process for the DSM CLI usessudoto move the binary into system-level directories (/usr/local/bin). This is an unnecessary privilege escalation in CI environments where local bin directories or path modifications are preferred.\n - Evidence:
sudo mv dsm-linux-amd64 /usr/local/bin/dsminsamples/ci-cd/azure-pipelines.yamlandsamples/ci-cd/github-actions.yaml.
Recommendations
- AI detected serious security threats
Audit Metadata