copilot-delegate

Fail

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill instructions direct the agent to execute the shell command copilot -p "依頼内容" by interpolating the user's request content directly into the command string. This pattern is highly susceptible to shell command injection attacks. An attacker can use control characters such as semicolons (;), pipes (|), or command substitution syntax ($() or backticks) to break out of the intended command and execute unauthorized shell operations with the privileges of the agent. For example, a user request like test"; whoami; # would cause the system to execute the whoami command.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 3, 2026, 12:53 AM