openharmony-download
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill logic in
SKILL.mdinterpolates user-provided variables${BRANCH}and${CUSTOM_DIR}directly into a shell command template used by theBashtool. Because there is no sanitization of these strings, an attacker can provide input containing shell metacharacters (e.g.,;,&,|) to execute unauthorized commands on the host system. - [EXTERNAL_DOWNLOADS] (MEDIUM): The
scripts/download_openharmony.shscript downloads therepotool fromhttps://raw.gitcode.com/gitcode-dev/repo/raw/main/repo-py3. GitCode is not on the list of trusted external sources provided in the security guidelines, introducing a third-party dependency risk. - [REMOTE_CODE_EXECUTION] (HIGH): The skill downloads the
repoutility, marks it as executable usingchmod a+x, and runs it viarepo init. This pattern of downloading and executing unverified remote code is a high-risk behavior that bypasses static analysis of the skill's actual runtime actions. - [PRIVILEGE_ESCALATION] (MEDIUM): The script
scripts/download_openharmony.shperforms achmod a+xon the downloadedrepotool. Additionally, the skill documentation prompts users to executesudo apt-get installcommands, which involves privilege elevation.
Recommendations
- AI detected serious security threats
Audit Metadata