matlab
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [External Downloads & Remote Code Execution] (HIGH): The file
references/octave-compatibility.mdinstructs users to install packages from arbitrary URLs viapkg install, which allows for the execution of untrusted remote code. - [Indirect Prompt Injection] (HIGH): The documentation extensively demonstrates unsanitized interpolation of variables into executable command strings. Mandatory Evidence Chain: 1. Ingestion points: Bash variables in
references/executing-scripts.mdand Python variables inreferences/python-integration.md. 2. Boundary markers: Absent. 3. Capability inventory:matlab -batch,octave --eval,pyrun,pyrunfile, andrequests.get. 4. Sanitization: Absent. These patterns allow malicious data to escape string boundaries and execute arbitrary logic. - [Dynamic Execution] (MEDIUM):
references/python-integration.mddocuments the use ofpyrunandpyrunfilefor runtime execution of Python code, which can be used to execute dynamic or obfuscated payloads. - [Privilege Escalation] (LOW):
references/executing-scripts.mdprovides examples of usingchmod +xto grant execution permissions to files.
Recommendations
- AI detected serious security threats
Audit Metadata