podkop-openwrt-guide
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Documentation provides instructions to execute a shell script directly from a remote GitHub repository (raw.githubusercontent.com/itdoginfo/podkop) to facilitate automated installation and updates.
- [EXTERNAL_DOWNLOADS]: The skill fetches configuration templates (/etc/config/podkop) and references binary packages for download from GitHub Releases.
- [COMMAND_EXECUTION]: Instructions involve running various system-level CLI commands (podkop start, podkop restart, podkop global_check) to manage services and networking on the OpenWrt router.
- [PROMPT_INJECTION]: The skill facilitates the ingestion of user-provided proxy configuration strings which are used to generate system-level routing and proxy configurations.
- Ingestion points: UCI configuration file at /etc/config/podkop.
- Boundary markers: None explicitly defined in the prompts.
- Capability inventory: System-level command execution, modification of UCI network configs, and management of the sing-box orchestration layer.
- Sanitization: Documentation references the use of frontend validators and backend shell logic to handle and verify input strings.
Audit Metadata