server-checkup
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [Privilege Escalation] (HIGH): The skill provides instructions to configure passwordless sudo access, which bypasses a critical security layer. \n
- Evidence: File
references/ssh-hardening.mdcontains the commandecho "<user> ALL=(ALL) NOPASSWD: ALL" | sudo tee /etc/sudoers.d/010_<user>-nopasswd.\n- [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill references untrusted external documentation to drive terminal configuration changes on the remote host. \n - Evidence: File
references/terminal-compat.mdlinks tohttps://ghostty.org/docs/help/terminfoand suggests executinginfocmpandticon derived content.\n- [Dynamic Execution] (MEDIUM): The skill documentation describes an autonomous mode that manages child processes for parallel system auditing. \n - Evidence:
README.mddescribes an 'Auto mode' that 'spawns subagents for parallel execution'.\n- [Command Execution] (MEDIUM): The skill performs broad and high-impact system modifications including disabling services and altering authentication configs. \n - Evidence: Multiple files contain
sudo systemctlcommands and direct modification of/etc/ssh/sshd_config.d/and/etc/apt/configs.
Recommendations
- AI detected serious security threats
Audit Metadata