comfy-swap
Fail
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes an installation script (
scripts/install.py) that downloads a binary and executes it to verify the version.\n - Evidence: The script fetches a binary from
github.com/kamjin3086/comfy-swapand executes it usingsubprocess.runto extract version information.\n - Risk: The script contains logic to explicitly disable SSL verification (
ssl.CERT_NONE) if a secure connection fails, allowing for potential delivery of a malicious binary via an intercepted network connection.\n- [EXTERNAL_DOWNLOADS]: The skill relies on fetching components and updates from external network locations.\n - Evidence: The
install.pyscript downloads binaries and metadata from GitHub's release API.\n - Evidence: The
setup.mdinstructions guide the agent to perform binary upgrades using a built-in download command.\n- [COMMAND_EXECUTION]: The skill makes extensive use of system commands to manage the installation environment.\n - Evidence: The installation script and setup guide utilize
chmod +xto grant execution permissions to downloaded files.\n - Evidence: The skill modifies system shell profiles (e.g.,
~/.bashrc,~/.zshrc) to update the user'sPATHvariable.\n - Evidence: The skill uses
pkillandtaskkillto terminate running processes during upgrades.\n- [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection by processing external data.\n - Ingestion points: Data enters the agent context through
comfy-swap list,comfy-swap logs, andcomfy-swap infocommands inSKILL.md.\n - Capability inventory: The skill can execute CLI commands, write files to the disk, and modify environment configurations as documented in
references/cli-reference.md.\n - Sanitization: No evidence of sanitization or validation of the content returned by the ComfyUI API or logs is performed before being processed by the LLM.\n
- Boundary markers: There are no explicit delimiters or protective instructions used when interpolating external tool output into the prompt.
Recommendations
- HIGH: Downloads and executes remote code from: unknown (check file) - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata