find-skills
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (HIGH): The core functionality of the skill is to download and execute code from remote sources using the
pnpm dlx skills addcommand. The instructions explicitly recommend using the-yor--yesflag to skip interactive confirmation prompts (e.g., inSKILL.mdandreferences/discovery-guide.md). This allows an agent to install arbitrary software from untrusted repositories (like the suggestedoakoss/agent-skills) without human oversight. - Indirect Prompt Injection (LOW): The
scripts/enrich_find.jsscript fetches HTML content fromskills.shandagent-skills.mdto provide skill descriptions. This content is processed and presented to the AI agent without sanitization for malicious instructions. - Ingestion points:
scripts/enrich_find.jsviahttps.getfetching fromskills.shandagent-skills.md. - Boundary markers: Absent; fetched descriptions are printed directly to the console output.
- Capability inventory: The agent has the capability to execute commands and install persistent code via the
skillsCLI. - Sanitization: Minimal; the script strips HTML tags but does not filter for embedded natural language instructions.
- Command Execution (MEDIUM): The
scripts/enrich_find.jsscript useschild_process.execFileSyncto execute thepnpmCLI. WhileexecFileSyncis generally safer thanexecregarding shell injection, the script dynamically passes user-provided search queries as arguments to a remote package execution command (pnpm dlx).
Recommendations
- AI detected serious security threats
Audit Metadata