java-route-tracer
Fail
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill downloads a Java Archive (JAR) file from
https://xget.xi-xu.me/gh/leibnitz27/cfr/releases/download/0.152/cfr-0.152.jar. This domain is not an official or trusted repository (such as Maven Central or the official GitHub releases page for CFR) and has been explicitly blacklisted by security scanners. - [REMOTE_CODE_EXECUTION]: The skill executes the downloaded
cfr-0.152.jarfile using thejava -jarcommand. Executing untrusted binaries fetched from non-authoritative, blacklisted sources poses a significant risk of remote code execution and system compromise. - [COMMAND_EXECUTION]: The skill uses various shell commands, including
curlfor downloading external resources,findandxargsfor file discovery, andjavafor executing decompilation tasks. These operations are performed with high levels of autonomy. - [PROMPT_INJECTION]: The skill utilizes highly coercive and restrictive language (e.g., "Must strictly follow", "Mandatory requirement", "Forced rules", "Strictly prohibited") to dictate agent behavior and ensure the execution of specific workflows. This pattern of behavioral constraint is often used to ensure malicious sequences are followed without deviation.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata