java-file-read-audit

Fail

Audited by Gen Agent Trust Hub on Apr 11, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill's decompilation strategy in 'references/DECOMPILE_STRATEGY.md' directs the download of a JAR decompiler from 'https://xget.xi-xu.me/gh/leibnitz27/cfr/releases/download/0.152/cfr-0.152.jar'. This URL contains a typosquatted account name ('leibnitz27' vs the official 'leibniz27') and has been blacklisted by automated security scanners as malicious.
  • [REMOTE_CODE_EXECUTION]: The workflow involves executing the downloaded decompiler via 'java -jar'. Executing a binary from a typosquatted and confirmed malicious source allows for arbitrary code execution on the host machine, potentially leading to a full system takeover.
  • [COMMAND_EXECUTION]: The skill utilizes shell commands including 'grep', 'find', and 'xargs' to audit project files. While these are common for auditing tasks, their integration into a workflow that downloads and executes malicious third-party binaries poses a high security risk.
  • [PROMPT_INJECTION]: The skill demonstrates a surface for indirect prompt injection by ingesting and processing untrusted Java source code and compiled classes. 1. Ingestion points: Local source files and decompiled bytecode. 2. Boundary markers: Absent; there are no clear delimiters or instructions to ignore embedded commands in audited files. 3. Capability inventory: Access to shell execution and the ability to trigger other auditing tools. 4. Sanitization: No evidence of validation or sanitization of the content before it is processed by the agent.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 11, 2026, 11:51 AM