NYC
skills/letta-ai/skills/build-pov-ray/Gen Agent Trust Hub

build-pov-ray

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • Privilege Escalation (HIGH): The skill instructs the agent to use sudo for installation tasks.
  • Evidence: sudo cp povray /usr/local/bin/ and sudo make install in Step 6.
  • External Downloads & Remote Code Execution (HIGH): The skill downloads source code from an external, non-trusted source (ftp.povray.org) and proceeds to compile and install it.
  • Evidence: wget ftp://ftp.povray.org/pub/povray/Old-Versions/POV-Ray-2.2/povray22.tar.Z followed by make and installation commands. While the URL appears to be the official source for the software, it is not within the defined Trusted Source Scope, making the automated download and subsequent execution high-risk.
  • Dynamic Execution (MEDIUM): The skill involves runtime compilation of C source code.
  • Evidence: Step 5 uses make and gcc to compile extracted source files into an executable binary.
  • Indirect Prompt Injection (LOW): The skill is vulnerable to instructions embedded in the software it processes.
  • Ingestion points: README*, INSTALL*, and Makefile files extracted from the downloaded archive in Step 4.
  • Boundary markers: Absent. The agent is instructed to cat and grep these files to determine build steps.
  • Capability inventory: The agent has the ability to execute shell commands, compile code, and use sudo privileges.
  • Sanitization: Absent. There is no validation or filtering of the content within the downloaded documentation or build scripts.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:05 PM