minecraft-modpack-server

Fail

Audited by Gen Agent Trust Hub on Apr 27, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • [PRIVILEGE_ESCALATION]: The skill uses sudo apt install to install Java runtimes and sudo ufw allow to modify the system's firewall configuration.
  • [EXTERNAL_DOWNLOADS]: Downloads a server pack from an external URL provided by the user at runtime using wget and extracts it into the file system.
  • [REMOTE_CODE_EXECUTION]: Executes a shell script (startserver.sh) found within the downloaded ZIP file. This executes arbitrary code from an untrusted source directly on the host system.
  • [PERSISTENCE]: Sets up an automated backup system by creating a shell script and adding it to the user's crontab, ensuring it runs every hour.
  • [DYNAMIC_EXECUTION]: Generates multiple shell scripts (start-minecraft.sh, backup.sh) at runtime and uses chmod +x to make them executable.
  • [INDIRECT_PROMPT_INJECTION]: The skill processes external data (the server pack ZIP) without validation or sanitization, while possessing high-privilege capabilities such as shell access and sudo permissions.
  • Ingestion points: ZIP file downloaded from a user-provided URL.
  • Boundary markers: None present.
  • Capability inventory: Package installation (apt), firewall modification (ufw), arbitrary shell script execution (bash), and persistent task scheduling (cron).
  • Sanitization: None observed.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 27, 2026, 07:07 AM