requesthunt

Fail

Audited by Gen Agent Trust Hub on Apr 21, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill's setup instructions in SKILL.md recommend installing a CLI tool by piping a remote script from https://requesthunt.com/cli directly to the shell (sh). This method executes remote code without prior manual review of the script content.\n- [COMMAND_EXECUTION]: The skill instructions demonstrate shell command usage where user-provided search queries and topics are interpolated directly as arguments (e.g., requesthunt search "$QUERY"). The instructions do not specify sanitization or shell-escaping for these inputs, which could allow a malicious user to execute arbitrary commands using shell metacharacters.\n- [PROMPT_INJECTION]: The skill facilitates the ingestion of a high volume of untrusted, user-generated content from platforms such as Reddit, X, and GitHub, creating an indirect prompt injection surface.\n
  • Ingestion points: The requesthunt search, requesthunt list, and requesthunt scrape commands in SKILL.md entry points for external data.\n
  • Boundary markers: Present. The skill's "Content Safety" section suggests using blockquotes to delimit external content.\n
  • Capability inventory: The agent has shell access via the requesthunt CLI and the ability to perform automated web scraping.\n
  • Sanitization: Recommended. The instructions suggest summarizing and quoting feedback instead of verbatim repetition, although no programmatic sanitization is defined.
Recommendations
  • HIGH: Downloads and executes remote code from: https://requesthunt.com/cli - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 21, 2026, 07:06 AM