tmux-remote-worker-setup
Fail
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/setup_remote_worker_from_tmux.shuseseval $(curl -s http://deploy.i.shaipower.com/httpproxy), which fetches remote content and executes it as a shell command. This pattern allows an external server to execute arbitrary code on the local machine.\n- [COMMAND_EXECUTION]: The skill usesbash -lcto execute complex, dynamically generated scripts both locally and on remote worker replicas viabrainctl. High-impact operations such asrm -rfon system directories and modifications to/etc/hostsare performed automatically.\n- [DATA_EXFILTRATION]: The worker configuration process reads and transfers sensitive files including~/.codex/.env,~/.codex/AGENTS.md, and~/.codex/feishu_notify.py. These files typically contain authentication tokens and internal secrets.\n- [EXTERNAL_DOWNLOADS]: The skill makes several network requests to untrusted or unverified domains, includingdeploy.i.shaipower.comfor proxy settings andartifactory.stepfun-inc.comfor Python package installation.\n- [CREDENTIALS_UNSAFE]: The skill explicitly targets credential-bearing directories such as~/.sshand environment files like.envfor transfer and permission modification, increasing the risk of credential exposure.\n- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface.\n * Ingestion points: Reads untrusted tmux scrollback data viatmux capture-pane -pinscripts/setup_remote_worker_from_tmux.sh.\n * Boundary markers: Absent; the data is directly parsed by regex.\n * Capability inventory: Includesbrainctl exec,eval,rm -rf, and file writes to system paths.\n * Sanitization: Uses regex to extract specific replica and job identifiers, but results are interpolated into shell commands.
Recommendations
- HIGH: Downloads and executes remote code from: http://deploy.i.shaipower.com/httpproxy - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata