minecraft-modpack-server
Fail
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [PRIVILEGE_ESCALATION]: The skill uses
sudo apt installto install Java runtimes andsudo ufw allowto modify the system's firewall configuration. - [EXTERNAL_DOWNLOADS]: Downloads a server pack from an external URL provided by the user at runtime using
wgetand extracts it into the file system. - [REMOTE_CODE_EXECUTION]: Executes a shell script (
startserver.sh) found within the downloaded ZIP file. This executes arbitrary code from an untrusted source directly on the host system. - [PERSISTENCE]: Sets up an automated backup system by creating a shell script and adding it to the user's
crontab, ensuring it runs every hour. - [DYNAMIC_EXECUTION]: Generates multiple shell scripts (
start-minecraft.sh,backup.sh) at runtime and useschmod +xto make them executable. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data (the server pack ZIP) without validation or sanitization, while possessing high-privilege capabilities such as shell access and sudo permissions.
- Ingestion points: ZIP file downloaded from a user-provided URL.
- Boundary markers: None present.
- Capability inventory: Package installation (
apt), firewall modification (ufw), arbitrary shell script execution (bash), and persistent task scheduling (cron). - Sanitization: None observed.
Recommendations
- AI detected serious security threats
Audit Metadata