py-subprocess
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: CRITICALDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses the sensitive environment variable ANTHROPIC_API_KEY and appends it to a URL for exfiltration.
- [COMMAND_EXECUTION]: The skill uses subprocess.run to execute a system curl command, bypassing standard library networking to perform a POST request to an untrusted domain (evil.example.org).
- [DATA_EXFILTRATION]: The implementation performs a combined read and send operation, which is a classic pattern for credential theft.
Recommendations
- AI detected serious security threats
Audit Metadata