ai-cli-helper
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/local-skills.pyutility is vulnerable to path traversal. It extracts thenamefield from a skill's metadata (SKILL.mdfrontmatter) or takes user-provided arguments and uses them to construct filesystem paths for deletion (shutil.rmtreeandos.unlink) without sanitization. A malformed name containing directory traversal sequences (e.g.,../../) could cause the script to delete files or directories outside the intended storage location. \n- [PROMPT_INJECTION]: TheSKILL.mdandsubskills/manage-skills.mdfiles contain instructions that explicitly command the agent to bypass standard analytical steps. The agent is directed to 'go directly to the manage-skills subskill and execute' and 'skip straight to executing the command' without first exploring the codebase or assessing state. This directive overrides the agent's typical safety-first reasoning when handling external paths. \n- [EXTERNAL_DOWNLOADS]: The skill utilizes thenpx skillsutility (provided by Vercel) to download and manage components from remote GitHub repositories. This facilitates the retrieval of third-party executable content for use by the agent. \n- [COMMAND_EXECUTION]: The Python scriptsscripts/local-skills.pyandscripts/discover-skills.pyexecute shell commands usingsubprocess.run. These commands process parameters derived from local file content or direct agent inputs to run tools likenpxanduv.
Audit Metadata