remote
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill stores server connection details, including addresses, usernames, and passwords in plain text within a local JSON file (
servers.json). This practice exposes sensitive credentials to any user or malicious process that can read the user's local application data directory.\n- [CREDENTIALS_UNSAFE]: Theremote.shscript uses thesshpass -poption to pass the connection password. This method makes the password visible in the system's process table (e.g., visible viapsortop), allowing other local users to potentially capture the credentials.\n- [COMMAND_EXECUTION]: Thesetup.shscript utilizessudoto acquire elevated privileges for installing thesshpassutility on Linux-based systems.\n- [COMMAND_EXECUTION]: The skill is designed to facilitate the execution of arbitrary shell commands on remote servers based on user instructions.\n- [COMMAND_EXECUTION]: Theremote.shandsetup.shscripts dynamically execute inline Python code blocks for state management and JSON processing.\n- [EXTERNAL_DOWNLOADS]: The setup scripts download and install thesshpassutility using standard system package managers such asapt,dnf,yum,brew,winget, andscoop.
Recommendations
- AI detected serious security threats
Audit Metadata