requesthunt
Fail
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's setup instructions in SKILL.md recommend installing a CLI tool by piping a remote script from
https://requesthunt.com/clidirectly to the shell (sh). This method executes remote code without prior manual review of the script content.\n- [COMMAND_EXECUTION]: The skill instructions demonstrate shell command usage where user-provided search queries and topics are interpolated directly as arguments (e.g.,requesthunt search "$QUERY"). The instructions do not specify sanitization or shell-escaping for these inputs, which could allow a malicious user to execute arbitrary commands using shell metacharacters.\n- [PROMPT_INJECTION]: The skill facilitates the ingestion of a high volume of untrusted, user-generated content from platforms such as Reddit, X, and GitHub, creating an indirect prompt injection surface.\n - Ingestion points: The
requesthunt search,requesthunt list, andrequesthunt scrapecommands in SKILL.md entry points for external data.\n - Boundary markers: Present. The skill's "Content Safety" section suggests using blockquotes to delimit external content.\n
- Capability inventory: The agent has shell access via the
requesthuntCLI and the ability to perform automated web scraping.\n - Sanitization: Recommended. The instructions suggest summarizing and quoting feedback instead of verbatim repetition, although no programmatic sanitization is defined.
Recommendations
- HIGH: Downloads and executes remote code from: https://requesthunt.com/cli - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata