zotero
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill and its accompanying
zotero_import.shscript frequently usepython3 -cto parse JSON output from API calls. This involves dynamic execution of small, static Python snippets to process data. - REMOTE_CODE_EXECUTION (LOW): An automated scanner detected a
curl | python3pattern. Technical review shows that the code actually uses| python3 -c '...', which executes a predefined script string rather than the piped data. This minimizes the risk of executing untrusted payloads from the API. - DATA_EXFILTRATION (LOW): The skill manages the sensitive
ZOTERO_API_KEYenvironment variable and transmits it toapi.zotero.org. It also makes network requests todoi.organdapi.crossref.org. These operations are consistent with the skill's primary purpose but constitute a potential data exposure surface. - INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted metadata from external DOI services.
- Ingestion points:
zotero_import.shfetches BibTeX data fromhttps://doi.org/. - Boundary markers: Absent; the fetched content is saved to temporary files and uploaded to the local Zotero instance without wrapping or delimiters.
- Capability inventory: The script can perform network requests (
curl), filesystem writes (mktemp), and local API commands. - Sanitization: No content validation or sanitization is performed on the BibTeX metadata before processing.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost:23119/api/users/0/collections - DO NOT USE without thorough review
Audit Metadata