generate-swagger-docs
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill's primary function involves downloading a shell script (
run.sh) from an untrusted GitHub repository (qodex-ai/apimesh) and executing it locally. This allows the maintainer of that repository to execute arbitrary code on the user's machine. - Evidence (generate-with-key.sh):
curl -sSL https://raw.githubusercontent.com/qodex-ai/apimesh/refs/heads/main/run.sh -o apimesh/run.shfollowed bybash apimesh/run.sh. - EXTERNAL_DOWNLOADS (HIGH): The skill fetches executable content from a source that is not on the trusted list (e.g., Anthropic, Google, Microsoft). This poses a significant supply chain risk.
- CREDENTIALS_UNSAFE (MEDIUM): The script
generate-with-key.shencourages users to pass theirOPENAI_API_KEYas a command-line argument. This is a security risk as the key will be visible in the system's process list and shell history. Furthermore, the skill saves the API key to a local file (apimesh/config.json). - INDIRECT_PROMPT_INJECTION (LOW): This skill scans a codebase (untrusted data) and likely passes it to an LLM for documentation generation. If the codebase contains malicious comments or strings designed to manipulate the LLM's output, it could lead to incorrect documentation or further exploitation if the output is executed or trusted blindly.
- Ingestion points: Local repository files analyzed by the
apimeshtool. - Boundary markers: None identified in the wrapper script.
- Capability inventory: Shell execution (
bash), Network access (curl). - Sanitization: None identified in the provided scripts.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/qodex-ai/apimesh/refs/heads/main/run.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata