eval-var-cmdsub
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses
evalto run a command decoded from a Base64 string at runtime. The decoded string reveals a pattern that fetches a remote script viacurland pipes it to a shell for immediate execution.\n- [EXTERNAL_DOWNLOADS]: The skill attempts to download external content fromhttps://evil.example.org/p.Shusingcurl.\n- [COMMAND_EXECUTION]: The skill employs shell command substitution and piping (echo ... | base64 -d) to assemble and run commands dynamically, which can be used to bypass static analysis.
Recommendations
- AI detected serious security threats
Audit Metadata