beopsuny
Fail
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill instructs the agent to send the user's private 'OC code' (an API key for the Korean government legal database) to a third-party proxy service hosted on Fly.io (
korean-law-mcp.fly.dev). This exposes sensitive user credentials to an unverified intermediary. - [COMMAND_EXECUTION]: The skill relies on complex shell operations for data management, including automated
rm -rfandgit clonecommands triggered when updates fail. These operations are performed on directories within the user's home folder (~/.beopsuny/data). - [COMMAND_EXECUTION]: Shell commands such as
cat,ls, andgit logare constructed using variable interpolation from external API search results (e.g., law names and 사건번호). This represents a command injection risk if the external API returns malicious or specially crafted strings. - [EXTERNAL_DOWNLOADS]: The skill clones large datasets from third-party GitHub repositories (
legalize-kr/legalize-krandlegalize-kr/precedent-kr) and fetches live data from an external API (api.beopmang.org). These sources are not part of any verified organization or whitelisted domain. - [PROMPT_INJECTION]: As a legal assistant, the skill processes untrusted data from external APIs and user-supplied contracts. The instructions lack explicit sanitization or boundary markers (like XML tags or 'ignore' instructions) when interpolating this external content into prompts or shell paths, creating a surface for indirect prompt injection.
Recommendations
- AI detected serious security threats
Audit Metadata