arkweb-app-debug
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Unverifiable Dependencies] (HIGH): The scripts
start-debug.pyandstart-debug.shattempt to execute a binary file namedarkweb-app-debug(orarkweb-app-debug.exeon Windows) located within the skill's ownscripts/directory. This binary is not provided in the skill source, making its behavior opaque and unverifiable. - [Indirect Prompt Injection] (HIGH): The skill possesses a high-privilege attack surface. It ingests data from external HarmonyOS project files (e.g.,
AppScope/app.json5) to extract package names and subsequently uses this data to construct and execute system commands viahdcand the opaque binary. There are no visible sanitization or boundary markers to prevent malicious project files from influencing command execution. - Ingestion points: Project configuration files like
AppScope/app.json5. - Boundary markers: Absent.
- Capability inventory:
Bashtool usage,subprocess.Popencalls,hdc(HarmonyOS Device Connector) operations, and execution of local binaries. - Sanitization: No evidence of input validation or escaping for project-derived data.
- [Command Execution] (MEDIUM): The skill dynamically modifies the system
PATHbased on output from an external skill (ohos-app-build-debug). If that dependency is compromised, it could lead to path hijacking or the execution of malicious tools instead of the intended HarmonyOS utilities. - [Remote Code Execution] (MEDIUM): The
troubleshooting.mdfile encourages users to runpip install -e ., suggesting the potential for installing unverified Python packages or executing setup scripts that are not present in the audited file set.
Recommendations
- AI detected serious security threats
Audit Metadata