ohos-app-build-debug
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (CRITICAL): The script
scripts/parse_crash.pyis vulnerable to shell command injection. When the-c(content) flag is used, the script joins the raw, unsanitized crash content into a command string and executes it viaos.system(). An attacker can inject arbitrary commands (e.g., using;,&&, or|) that will be executed with the privileges of the agent. - REMOTE_CODE_EXECUTION (HIGH): The vulnerability in
parse_crash.pyfacilitates remote code execution if the agent is instructed to analyze a crash log obtained from an untrusted remote source, such as a URL or a third-party application log. - PROMPT_INJECTION (MEDIUM): This skill is highly vulnerable to indirect prompt injection. Malicious instructions or payloads can be embedded in crash data, which the agent then passes to the vulnerable tool, resulting in system compromise without the user's direct involvement.
- DATA_EXFILTRATION (LOW): The script
scripts/screenshot.pyutilizeshdc file recvto automate the transfer of files from a connected device to the host. While intended for screenshots, this capability could be used to extract sensitive files from a HarmonyOS device if the agent is manipulated by a malicious prompt.
Recommendations
- AI detected serious security threats
Audit Metadata