self-subagent
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
quality-gate.shscript executesnpm run lintandnpm testwithin the$SUBAGENT_DIR. Since this directory contains output from an AI subagent (untrusted data), a malicious subagent could provide apackage.jsonfile with arbitrary shell commands in itsscriptssection. These commands would then be executed with the full privileges of the agent runner.\n- REMOTE_CODE_EXECUTION (HIGH): The script executesnpx tscand local./node_modules/.bin/tscon the subagent's codebase. Running compilers and build tools on untrusted source code is dangerous, as malicious configurations or tool vulnerabilities can be exploited to achieve code execution.\n- SAFE (INFO): The skill includes documentation (references/quality-gate.md) for a secret detection system designed to catch API keys and credentials in diffs. This is a positive security feature, but it does not mitigate the primary command execution vulnerability present in the quality gate's verification logic.\n- COMMAND_EXECUTION (MEDIUM): Thereferences/cli-profiles.mdfile provides instructions on using highly permissive and dangerous flags for various AI CLIs, such as--dangerously-allow-all,--dangerously-skip-permissions, and--yolo. While these are documented as intended features of those tools, recommending their use in automated workflows increases the risk of unintended system modifications.
Recommendations
- AI detected serious security threats
Audit Metadata