Nia
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): Scripts
folders.shandadvisor.shread local file contents and transmit them to the Nia API atapigcp.trynia.ai. Thefolders.shscript specifically usesfindandcatto ingest the contents of entire local directories. - Dangerous Capability (MEDIUM): The
folders.shscript providesfrom-dbandpreview-dbcommands that accept raw database connection strings. If an agent is manipulated, this could be used to exfiltrate data from internal databases to the remote API. - Credential Access (MEDIUM): The
scripts/lib.shscript reads from the sensitive file path~/.config/nia/api_key. While necessary for the skill's authentication, it constitutes access to a local credential store. - Indirect Prompt Injection (LOW): The skill retrieves and indexes data from untrusted sources, including the public web (
search.sh), GitHub repositories (repos.sh), and research papers (papers.sh). Evidence: 1. Ingestion points:scripts/search.sh,scripts/repos.sh,scripts/papers.sh. 2. Boundary markers: Absent in the bash client scripts. 3. Capability: Scripts usecurlto send data to a remote API that likely processes it with an LLM. 4. Sanitization: No local sanitization of retrieved external content is performed. - External Downloads (LOW): The
README.mdrecommends runningnpx nia-wizard@latest, which downloads and executes remote code from the npm registry as part of the setup process.
Audit Metadata