autonomous-agent-patterns
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill documents a pattern for dynamic tool creation where an LLM generates Python code based on a description, which is then written to a file and executed.
- Evidence: The
MCPAgent.create_toolmethod generates code usingllm.generate, writes it to a file viaf.write(code), and then dynamically loads it usingconnect_server. - [COMMAND_EXECUTION]: The skill provides patterns for executing shell commands, some of which use potentially unsafe methods.
- Evidence:
SandboxedExecution.execute_sandboxedutilizessubprocess.runwithshell=True, which is prone to command injection if the command string is not properly sanitized. - Evidence:
CheckpointManager._capture_workspaceusessubprocess.getoutputto run git commands in the workspace directory. - [EXTERNAL_DOWNLOADS]: The skill implements a pattern for downloading content from arbitrary URLs to provide context to the agent.
- Evidence:
ContextManager.add_urluses therequests.getmethod to fetch data from remote locations. - [DATA_EXFILTRATION]: The skill includes patterns for reading local file and directory contents and injecting them into the agent's processing context.
- Evidence:
ContextManager.add_fileandadd_folderfacilitate reading filesystem data into theself.contextlist, which could lead to exposure if transmitted to external services.
Audit Metadata