sprite
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The setup guide in
references/setup.mdinstructs users to executecurl -LsSf https://astral.sh/uv/install.sh | sh. Piped execution of remote scripts is a critical risk as the content can be modified by an attacker or intercepted.\n- REMOTE_CODE_EXECUTION (HIGH): The skill recommends cloning a repository from a personal account (spm1001/claude-config) and immediately running a setup script (./scripts/setup-machine.sh). This allows arbitrary code execution on the sprite from an unverified source.\n- COMMAND_EXECUTION (MEDIUM): Thesprite execandsprite consolecommands allow arbitrary command execution on remote VMs. While functional for the skill's purpose, this provides a powerful primitive for potential abuse.\n- CREDENTIALS_UNSAFE (MEDIUM): Thetest-outer-inner.shscript and troubleshooting documentation facilitate passing sensitive credentials likeCLAUDE_CODE_OAUTH_TOKENandSPRITE_TOKENvia environment variables and CLI arguments, which can be exposed in process lists, shell history, and logs.\n- PROMPT_INJECTION (LOW): The 'OuterClaude/InnerClaude' pattern creates an indirect prompt injection surface where the primary agent (OuterClaude) processes output from a nested agent (InnerClaude). \n • Ingestion points: Output captured fromtmux pipe-paneorscriptcommands as described intest-outer-inner.shandtroubleshooting.md. \n • Boundary markers: None present to distinguish InnerClaude output from system instructions. \n • Capability inventory: ThespriteCLI allows full shell execution and file system access on the Sprite. \n • Sanitization: None present; output is captured and grepped without validation or escaping.\n- PERSISTENCE (MEDIUM): Setup scripts modify~/.bashrcto establish persistent environment configurations across sessions.
Recommendations
- AI detected serious security threats
Audit Metadata