quest
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔴 VERDICT: HIGH
This skill's core functionality is to execute arbitrary JavaScript code (jobs) within a Sails.js environment. This is a powerful capability that, if misused through prompt manipulation, could lead to severe consequences. The primary security concerns are the potential for arbitrary command execution, data exfiltration through dynamic network requests or email/alert helpers, and the use of an unverified external dependency.
Total Findings: 3
🔴 HIGH Findings: • Command Execution
- Line 37 in rules/api.md: The
sails.quest.run(jobName, inputs?)method explicitly executes a job immediately by spawning a child process viasails run <script-name>. This is confirmed inrules/getting-started.md(Line 59: "the hook spawnssails run <script-name>as a child process") andrules/job-definition.md(Line 190: "Each job runs as a separate Node.js process viasails run"). Inputs are serialized as CLI arguments, creating a potential vector for command injection ifjobNameorinputscan be controlled by a malicious prompt.
🟡 MEDIUM Findings: • Unverifiable Dependencies
- Line 13 in README.md: The installation instruction
npx skills add sailscastshq/boring-stack/skills/questand the explicitnpm install sails-hook-quest(Line 20 inrules/getting-started.md) refer tosails-hook-questfrom thesailscastshqGitHub organization. This organization is not listed as a trusted source, meaning the core dependency of the skill is unverified and could potentially contain malicious code. • Data Exfiltration - Line 240 in rules/patterns.md: Examples demonstrate sending data via
sails.helpers.sendEmail.with(...)(e.g.,export-monthly-report.jssending CSV content to a dynamicrecipientEmail). Other examples showsails.helpers.sendSlackAlert.with(...)(e.g.,health-check.js,monitor-stale-data.js,Job Event Logging Pattern,quest:job:errorinrules/api.md) andsails.helpers.http.post(webhook.url, webhook.payload, ...)(e.g.,retry-webhooks.js). If a malicious prompt can control the destination (email, Slack channel, webhook URL) or the content of these communications, sensitive data could be exfiltrated to an attacker-controlled endpoint.
================================================================================================
- AI detected serious security threats