twitter-search
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The wrapper script
scripts/run_search.shuses theevalcommand on strings parsed from~/.bashrcand~/.zshrc. This is an unsafe practice that allows arbitrary code execution if the profile files contain malicious content or malformed exports.- [DATA_EXFILTRATION] (HIGH): The skill explicitly reads from sensitive shell configuration files (~/.bashrcand~/.zshrc). Accessing these files is a high-severity concern as they often contain private environment variables, security tokens, and personal configurations.- [EXTERNAL_DOWNLOADS] (MEDIUM): The scriptscripts/run_search.shautomatically installs therequestsPython package viapip3if it is not found on the system, which involves downloading code from the PyPI registry without explicit user confirmation at runtime.- [PROMPT_INJECTION] (LOW): The skill presents a surface for Indirect Prompt Injection by fetching and processing up to 1000 tweets from the Twitter API. Malicious instructions embedded in tweet content could influence the agent during the data analysis and reporting phase. 1. Ingestion points: Tweet data fetched viatwitter_search.py. 2. Boundary markers: No delimiters or ignore instructions are specified for the processed data. 3. Capability inventory: Shell script execution and Python package installation. 4. Sanitization: No sanitization or filtering of tweet text is mentioned.
Recommendations
- AI detected serious security threats
Audit Metadata