native-web-search
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
resolveConfigValuefunction insearch.mjsexecutes arbitrary shell commands usingexecSyncwhen a configuration value inauth.jsonis prefixed with an exclamation mark (!). This allows for command execution if the local configuration file is modified. - [REMOTE_CODE_EXECUTION]: The skill utilizes dynamic module loading in
loadPiAi, searching for and importing the@mariozechner/pi-aimodule from paths that include the current working directory and user-defined environment variables. This could lead to the execution of malicious code if the skill is run in a compromised directory. - [CREDENTIALS_UNSAFE]: The script manages sensitive API keys and OAuth tokens for OpenAI and Anthropic, storing them in plain text within a local configuration file (
~/.pi/agent/auth.json). - [PROMPT_INJECTION]: The skill is susceptible to both direct and indirect prompt injection. It lacks sanitization for user-provided query and purpose strings and does not use boundary markers when processing untrusted web search results.
- Ingestion points: Web search results processed by the LLM tools in
search.mjs. - Boundary markers: Absent.
- Capability inventory: Shell command execution via
execSyncinsearch.mjs. - Sanitization: None.
Audit Metadata