nocobase-api-call
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/nocobase-api.shuses thesourcecommand on a.envfile located in the user's current working directory. This is a form of dynamic code execution; if the.envfile contains malicious shell commands instead of simple variable assignments, those commands will be executed with the privileges of the agent. - [CREDENTIALS_UNSAFE]: The skill is designed to handle and store a
NOCOBASE_API_TOKEN. It encourages users to place these credentials in environment variables or a plain-text.envfile. While the skill includes a.gitignoreto prevent accidental commits, storing secrets in local files increases the surface area for credential theft. - [EXTERNAL_DOWNLOADS]: The skill uses the
curlutility to send data to and retrieve data from NocoBase API endpoints. This is the primary function of the skill and targets the vendor's infrastructure, but it involves outbound network communication based on user-provided endpoints. - [COMMAND_EXECUTION]: The script constructs a
curlcommand using user-supplied arguments for the HTTP method, endpoint, and data payload. While there is a basic check for the HTTP method, the endpoint and data arguments are passed directly tocurl, which could be exploited if the agent is tricked into using malicious arguments.
Audit Metadata