script-generator
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to execute the Python scripts it generates by using the
bash()function (e.g.,bash("python3 scripts/<name>.py")). This allows for the execution of arbitrary shell commands. - [REMOTE_CODE_EXECUTION]: The core functionality of the skill is to write Python logic to local files and then execute them immediately or schedule them for later. This allows a user to indirectly execute arbitrary code on the host system via the agent.
- [DATA_EXFILTRATION]: The documentation explicitly lists sensitive environment variables (
TAAPI_API_KEY,COINGLASS_API_KEY,LUNARCRUSH_API_KEY,COINGECKO_API_KEY) and instructs the scripts to access them usingos.getenv(). Because scripts use therequestslibrary, an attacker could easily transmit these credentials to an external server. - [COMMAND_EXECUTION]: The
schedule_taskfunction is used to create recurring background processes (python3 scripts/foo.py). This capability allows for persistent execution of code on the system without further agent intervention.
Recommendations
- AI detected serious security threats
Audit Metadata