ai-tool-compliance
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/install.shscript invokessudo apt-get installto fetch system utilities. This requires administrative privileges and represents a privilege escalation vector during the installation phase.\n- [DATA_EXFILTRATION]: Thescripts/notify.shscript sends analysis reports to an external Slack webhook. These reports contain thep0_detailfield, which includes raw code snippets, file paths, and line numbers, potentially leaking proprietary code to external infrastructure.\n- [EXTERNAL_DOWNLOADS]: The skill's installation script performs external network requests to download and install packages via theapt-getpackage manager.\n- [COMMAND_EXECUTION]: Several scripts, includingverify.shandscore.sh, execute internal Python code blocks using heredocs (`python3 - ... << 'PYTHON'
), which involves dynamic execution of script logic embedded within shell scripts.\n- **[PROMPT_INJECTION]:** The skill processes untrusted local source code (Ingestion points:BASE_DIRinverify.sh) without using boundary markers to isolate instructions. The capability inventory includes shell subprocess execution and network operations viacurl(Capability inventory:scripts/` directory). There is no evidence of sanitization performed on the ingested code before it is interpolated into reports, making the agent vulnerable to indirect prompt injection.
Recommendations
- AI detected serious security threats
Audit Metadata