ai-code-review-collaboration
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- Command Execution (HIGH): The
file-managerskill invokespowershell -ExecutionPolicy Bypassto execute theninja_deploy.ps1script. This script dynamically modifies C# source code using regular expressions to synchronize class names with filenames and subsequently copies these files to the NinjaTrader strategies directory (bin/Custom/Strategies). This grants the agent the ability to modify and deploy executable trading logic. - Remote Code Execution (HIGH): The
V9_001test agent instructions include commands to build (dotnet build) and execute (V9_ExternalRemote.exe) a binary project. This constitutes a direct path for the agent to compile and run potentially untrusted code on the host system. - External Downloads (MEDIUM): Scripts in the
web-artifacts-builderskill (init-artifact.shandbundle-artifact.sh) perform automated installations of numerous Node.js dependencies from external registries (e.g.,parcel,vite,tailwindcss) during the project initialization and bundling phases. - Data Exposure (LOW): Multiple configuration and script files, such as
Launch_Latest_Remote.ps1and thent8-backup-managerdocumentation, hardcode absolute local file paths that reveal the system username ('Mohammed Khalid') and internal directory structures. - Indirect Prompt Injection (LOW): The
ai-code-review-collaborationskill and the 'Brain & Hands' protocol involve processing user-provided code for review and delegating file operations across different AI models. This workflow lacks robust input sanitization or boundary markers, creating a surface for indirect prompt injection where malicious code snippets could influence agent behavior.
Recommendations
- AI detected serious security threats
Audit Metadata