install-script-generator
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runwithshell=Trueinscripts/executor.py,scripts/doc_generator.py, andscripts/env_explorer.pyto execute system-level commands. - [COMMAND_EXECUTION]: A command injection vulnerability exists in
scripts/plan_generator.pyandscripts/doc_generator.pywhere the user-supplied software name is directly embedded into shell commands likef"sudo apt-get install -y {target}"without validation. - [COMMAND_EXECUTION]: The skill requests and uses elevated privileges (
sudoor Administrator rights), which increases the potential impact of command injection. - [COMMAND_EXECUTION]: Indirect Prompt Injection Surface: 1. Ingestion points: User input for software target in
scripts/plan_generator.py. 2. Boundary markers: Absent. 3. Capability inventory: Elevated shell execution inscripts/executor.py. 4. Sanitization: Absent. - [EXTERNAL_DOWNLOADS]: The skill interacts with system package managers (apt, brew, winget, dnf, yum, pacman) to fetch software. While the managers are trusted, the specific packages are controlled by unsanitized user input.
Recommendations
- AI detected serious security threats
Audit Metadata