podkop-openwrt-guide

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: Documentation provides instructions to execute a shell script directly from a remote GitHub repository (raw.githubusercontent.com/itdoginfo/podkop) to facilitate automated installation and updates.
  • [EXTERNAL_DOWNLOADS]: The skill fetches configuration templates (/etc/config/podkop) and references binary packages for download from GitHub Releases.
  • [COMMAND_EXECUTION]: Instructions involve running various system-level CLI commands (podkop start, podkop restart, podkop global_check) to manage services and networking on the OpenWrt router.
  • [PROMPT_INJECTION]: The skill facilitates the ingestion of user-provided proxy configuration strings which are used to generate system-level routing and proxy configurations.
  • Ingestion points: UCI configuration file at /etc/config/podkop.
  • Boundary markers: None explicitly defined in the prompts.
  • Capability inventory: System-level command execution, modification of UCI network configs, and management of the sing-box orchestration layer.
  • Sanitization: Documentation references the use of frontend validators and backend shell logic to handle and verify input strings.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 09:31 PM