exploring-data
Fail
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/analyze.shfile is vulnerable to Python code injection. The script uses a bash heredoc to dynamically generate and execute Python code, interpolating the$DATAFILEvariable directly into a string literal:filepath = Path("$DATAFILE"). Because the heredoc is not quoted (e.g.,<< 'PYEOF'), bash expands the variable before the Python interpreter sees it. A malicious filename containing a closing quote and Python commands (e.g.,data.csv"); import os; os.system("ls /") #) would result in the execution of arbitrary commands under the agent's privileges. - [EXTERNAL_DOWNLOADS]: The
scripts/install_ydata.shscript downloads and installs theydata-profilingandsetuptoolspackages from the Python Package Index (PyPI) usinguv. This is the intended behavior for the skill's setup process.
Recommendations
- AI detected serious security threats
Audit Metadata