setup
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes administrative commands using
sudoto install system packages viaapt-get, manage system services withsystemctl, and modify system configuration files such as/etc/wsl.conf. - [COMMAND_EXECUTION]: Modifies Access Control Lists (ACLs) on the Docker socket (
/var/run/docker.sock) and creates systemd configuration overrides to grant the agent persistent access to the container runtime. - [COMMAND_EXECUTION]: Establishes background persistence by creating and loading service definitions for
launchd(macOS) andsystemd(Linux). - [REMOTE_CODE_EXECUTION]: Downloads and executes installation scripts from well-known technology providers by piping remote content to a shell:
https://get.docker.com | shandhttps://deb.nodesource.com/setup_22.x | sudo -E bash -. - [CREDENTIALS_UNSAFE]: Accesses local
.envfiles to read and verify sensitive authentication secrets, includingCLAUDE_CODE_OAUTH_TOKENandANTHROPIC_API_KEY. - [PROMPT_INJECTION]: Vulnerable to indirect shell command injection if a user provides a malicious GitHub username which is interpolated directly into
git remote addcommands. - Ingestion points: User input via
AskUserQuestion(GitHub username). - Boundary markers: Absent.
- Capability inventory: Shell command execution via
git. - Sanitization: Absent.
Recommendations
- HIGH: Downloads and executes remote code from: https://get.docker.com - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata