go-options-gen
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The skill instructs the installation of the
options-gentool fromgithub.com/kazhuravlev/options-gen. This repository and organization are not within the defined trusted source list, posing a supply-chain risk. - [COMMAND_EXECUTION] (HIGH): The workflow relies on
go generate ./.... This command scans Go source files for//go:generatedirectives and executes the accompanying shell commands. If the agent is used to process or complete code from untrusted sources, an attacker could embed malicious commands within these directives to achieve arbitrary command execution on the host. - [REMOTE_CODE_EXECUTION] (MEDIUM): The skill workflow involves downloading, installing, and executing a remote binary (
options-gen) usinggo installandgo tool. Because the source is unverified, this constitutes a risk of executing potentially malicious remote code. - [DATA_EXFILTRATION] (LOW): The example in
assets/go-generate/client.godemonstrates a pattern where a sensitivetokenis appended to a URL query parameter. While used forlocalhostin the example, this pattern encourages insecure transmission of credentials.
Recommendations
- AI detected serious security threats
Audit Metadata