build-pov-ray
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- Privilege Escalation (HIGH): The skill instructs the agent to use
sudofor installation tasks. - Evidence:
sudo cp povray /usr/local/bin/andsudo make installin Step 6. - External Downloads & Remote Code Execution (HIGH): The skill downloads source code from an external, non-trusted source (
ftp.povray.org) and proceeds to compile and install it. - Evidence:
wget ftp://ftp.povray.org/pub/povray/Old-Versions/POV-Ray-2.2/povray22.tar.Zfollowed bymakeand installation commands. While the URL appears to be the official source for the software, it is not within the defined Trusted Source Scope, making the automated download and subsequent execution high-risk. - Dynamic Execution (MEDIUM): The skill involves runtime compilation of C source code.
- Evidence: Step 5 uses
makeandgccto compile extracted source files into an executable binary. - Indirect Prompt Injection (LOW): The skill is vulnerable to instructions embedded in the software it processes.
- Ingestion points:
README*,INSTALL*, andMakefilefiles extracted from the downloaded archive in Step 4. - Boundary markers: Absent. The agent is instructed to
catandgrepthese files to determine build steps. - Capability inventory: The agent has the ability to execute shell commands, compile code, and use
sudoprivileges. - Sanitization: Absent. There is no validation or filtering of the content within the downloaded documentation or build scripts.
Recommendations
- AI detected serious security threats
Audit Metadata