llmer-demo
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The terminal automation feature utilizes the
node-ptylibrary to spawn a real, interactive shell (defaulting to/bin/zshor the user's$SHELL) on the host machine, which allows for the execution of arbitrary system commands as part of demo scenarios. - [DATA_EXFILTRATION]: The
initflow instructions direct the agent to perform extensive codebase exploration, specifically targeting.env.exampleand.env.localfiles to discover sensitive information such as API endpoints, URLs, and authentication secrets. - [REMOTE_CODE_EXECUTION]: The skill's automation engine includes an
execstep that allows for the execution of arbitrary asynchronous JavaScript code within the automation context. - [REMOTE_CODE_EXECUTION]: The
render-page.jsmodule implements a frame-by-frame rendering pipeline that useseval()within a headless Playwright browser to execute dynamically generated Canvas2D drawing commands for video annotations. - [EXTERNAL_DOWNLOADS]: The skill automates the installation of multiple external dependencies and binaries using
npmandnpx, including the Playwright browser engine, thenode-ptylibrary, and a vendor-specific library vianpx skills add llmer/skill-demoflow. - [COMMAND_EXECUTION]: The
studio.jscomponent launches a local web server and WebSocket server on port 3274, which listens for network connections and serves files from the skill's output directory to the local network.
Recommendations
- AI detected serious security threats
Audit Metadata