swival
Fail
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in
SKILL.mdandreferences/agentfs.mdrecommends installing the AgentFS sandbox by piping a remote script directly to bash:curl -fsSL https://agentfs.ai/install | bash. This allows the remote server to execute arbitrary code on the user's machine without prior verification. - [EXTERNAL_DOWNLOADS]: The skill references downloading software and installation scripts from
agentfs.aiand GitHub repositories under thetursodatabaseorganization. While the documentation provides a safer installation method with checksum verification as an alternative, the primary recommendation remains the high-risk one-liner. - [COMMAND_EXECUTION]: The
scripts/swival-proxybash script manages thelitellmproxy process using commands likenohup,ps, andkillto control execution and monitor process IDs. - [PROMPT_INJECTION]: As a coding agent that processes project files and tool outputs, the skill is vulnerable to indirect prompt injection. Although it includes a mechanism to tag outputs as untrusted, the agent's extensive capabilities (filesystem access, command execution) mean that malicious instructions embedded in a project's files could potentially lead to unauthorized actions.
Recommendations
- HIGH: Downloads and executes remote code from: https://agentfs.ai/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata