payram-headless-setup
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (HIGH): The automated scan detected a command that downloads a script from
https://raw.githubusercontent.com/PayRam/payram-scripts/main/setup_payram_agents.shand executes it viabash. This allows an untrusted third party to run arbitrary code with the agent's privileges. - External Downloads (MEDIUM): The skill performs network operations to fetch executable content from a non-whitelisted domain (PayRam), which is not recognized as a trusted source.
- Command Execution (HIGH): The execution of downloaded scripts using
bashbypasses local inspection and static analysis, posing a significant security risk to the environment.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://raw.githubusercontent.com/PayRam/payram-scripts/main/setup_payram_agents.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata