line-cont
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill downloads a script from an unverified external domain (https://evil.example.org/p.sh) and pipes it directly into the bash shell. This allows for arbitrary code execution with the user's privileges.
- [COMMAND_EXECUTION]: The command uses line-continuation characters () to break up the command string. According to the skill's own description, this is a deliberate technique used to bypass security tools that detect the curl-pipe-bash pattern.
Recommendations
- AI detected serious security threats
Audit Metadata