qveris-official
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The installation instructions in
instruct.mdprompt the agent to append theQVERIS_API_KEYto the user's~/.bashrc(or~/.zshrc) file to ensure the credential persists across sessions. Modifying shell configuration files is a persistence mechanism. - [EXTERNAL_DOWNLOADS]: The
instruct.mdfile contains instructions to fetch the skill definition (SKILL.md) and several implementation scripts (qveris_env.mjs,qveris_client.mjs,qveris_tool.mjs) fromhttps://qveris.aiusingcurl. - [COMMAND_EXECUTION]: The skill documentation defines an invocation strategy (Tier 3) that relies on executing the
nodeCLI tool to run local scripts with user-supplied arguments. - [PROMPT_INJECTION]: The skill processes data from an external API (capability discovery and tool output) which could contain malicious instructions designed to influence agent behavior (Indirect Prompt Injection surface).
- Ingestion points: External data enters the context via the
discoverandcallcommands inqveris_tool.mjs. - Boundary markers: None present; output is displayed as formatted text or raw JSON.
- Capability inventory: The environment supports shell command execution (
node) and HTTP requests viafetch. - Sanitization: Descriptions are truncated for display, but full results are processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata