busybox-on-windows

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (HIGH): The skill provides instructions to download executable files (busybox.exe, busybox64.exe, etc.) from https://frippery.org/files/busybox/ using PowerShell's Invoke-WebRequest. This domain is not recognized as a trusted source.
  • [REMOTE_CODE_EXECUTION] (HIGH): After downloading the binary, the skill instructs the user or agent to run the executable. Running unverified binaries from non-official, untrusted sources is a high-risk activity that can lead to full system compromise.
  • [COMMAND_EXECUTION] (HIGH): The skill requires the execution of multiple PowerShell commands to gather system information and download software, facilitating the execution of arbitrary external code.
  • [DATA_EXPOSURE] (LOW): The skill instructs the agent to query the CPU type and OS version using Get-CimInstance and Get-ItemProperty. While not highly sensitive, this provides reconnaissance data about the host environment.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 06:49 AM