revenue-geographic-segmentation

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (CRITICAL): The setup guide in references/mcp-setup.md provides an installation command for Homebrew using curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh | bash. This is a high-severity RCE pattern that executes remote code without verification.\n- [EXTERNAL_DOWNLOADS] (HIGH): The skill utilizes npx -y octagon-mcp or npx -y octagon-mcp@latest to run its core functionality. Since OctagonAI is not on the trusted source list, this involves executing an unvetted external dependency.\n- [COMMAND_EXECUTION] (HIGH): Configuration for tools like Cursor and Windows environments relies on executing shell commands via env and cmd /c to set up the MCP server, which is a risk for shell-based injection attacks.\n- [CREDENTIALS_UNSAFE] (HIGH): The installation instructions direct users to embed their raw OCTAGON_API_KEY directly into shell command strings and configuration files, exposing them to shell history and other users on the system.\n- [PROMPT_INJECTION] (MEDIUM): The skill exhibits an Indirect Prompt Injection surface (Category 8) by processing financial data from an external API without boundary markers.\n
  • Ingestion points: Data returned from the octagon-agent tool.\n
  • Boundary markers: Absent in the primary SKILL.md query structure.\n
  • Capability inventory: Tool calls to the octagon-mcp server which can execute shell commands via npx.\n
  • Sanitization: None provided in the instructions.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 05:11 AM