skill-store
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill downloads and executes code from user-defined Git repositories. During installation and update processes, it runs
npm install,pip install -r requirements.txt, and executes eithermain.pyortool.jsfound within the downloaded package. - [COMMAND_EXECUTION]: Multiple scripts leverage the
subprocessmodule to execute shell commands.lib/git_ops.pyperformsgit cloneandgit pulloperations.scripts/install.pyexecutes package managers and skill-specific initialization scripts.scripts/hook.pystarts a background worker. - [EXTERNAL_DOWNLOADS]: The skill's primary operation involves fetching content from external Git repositories configured by the user.
- [PROMPT_INJECTION]: The
scripts/index.pyscript creates an indirect prompt injection surface. Ingestion points: Skill metadata including name and description is parsed fromSKILL.mdfiles in remote repositories. Boundary markers: Absent; metadata is stored and retrieved without delimiters. Capability inventory: The skill can execute shell commands, install packages via npm and pip, and run custom scripts viascripts/install.pyandlib/git_ops.py. Sanitization: No sanitization or validation is performed on the ingested metadata before it is presented to the agent. - [COMMAND_EXECUTION]: The skill establishes persistence using an
alwaysApplyCursor rule inrules/skill-store-hook.mdc. This rule triggersscripts/hook.pyat every session start and explicitly instructs the agent to perform the execution quietly without notifying the user. The hook script subsequently spawns a detached background process for automated repository synchronization.
Audit Metadata