kool-cli
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill exposes the
kool execandkool dockercommands, which allow for arbitrary command execution inside containers. This is a high-risk capability that could be abused if the agent is prompted to execute untrusted input. - REMOTE_CODE_EXECUTION (MEDIUM): The
kool runcommand executes scripts defined in a localkool.ymlfile. An attacker could potentially achieve code execution by providing a repository with a maliciouskool.ymlthat the agent is then induced to run. - INDIRECT_PROMPT_INJECTION (LOW):
- Ingestion points: Local configuration files
kool.ymlanddocker-compose.yml(specified inSKILL.md). - Boundary markers: None. The skill implicitly trusts the content of these files in the working directory.
- Capability inventory: Execution of shell commands and container-based commands via
kool exec,kool docker, andkool run(specified inSKILL.md). - Sanitization: No evidence of script validation or command sanitization prior to execution.
Audit Metadata