skills/openclaw/skills/ralph-evolver/Gen Agent Trust Hub

ralph-evolver

Warn

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes execFileSync to run system commands including git, grep, npm, and pytest. It specifically executes scripts defined within the target project's configuration (e.g., npm run build, npm test), which may result in the execution of arbitrary commands if the skill is pointed at a malicious project directory.
  • [REMOTE_CODE_EXECUTION]: A core feature of the skill is 'recursive self-evolution,' where the AI agent is explicitly instructed to modify the skill's own source code (evolve.js) and continue execution in a loop. This results in the local execution of code generated by the LLM.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it scrapes untrusted data from the target project—including TODO/FIXME comments, git commit messages, and source code—and interpolates them directly into the LLM prompt without sanitization or protective delimiters.
  • Ingestion points: Data is collected from the file system and git history via the RuntimeSignals and HealthChecker classes in evolve.js.
  • Boundary markers: None. Ingested external content is placed directly under markdown headers without markers to prevent the model from obeying embedded instructions.
  • Capability inventory: The skill can execute shell commands via child_process.execFileSync and modify files using fs.writeFileSync and fs.renameSync.
  • Sanitization: None. The skill does not escape, filter, or validate the content extracted from the target project before including it in the prompt.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 25, 2026, 04:41 AM