cosmic-database
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The
scripts/download_cosmic.pyscript acceptsemailandpasswordas plaintext command-line arguments. These credentials can be exposed to other users on the same system via process listings (e.g.,ps aux) or shell history files. - Unverifiable Dependencies & Remote Code Execution (MEDIUM): The script performs network requests to
https://cancer.sanger.ac.uk/to download large compressed data files. This domain is not included in the Trusted External Sources list, and the downloaded content is written directly to the local file system. - Indirect Prompt Injection (MEDIUM): The skill is designed to ingest external data which could contain malicious instructions or schema-confusing data. Evidence: 1. Ingestion Point:
scripts/download_cosmic.pyviarequests.get(). 2. Boundary Markers: Absent. 3. Capability Inventory: File-write operations viaopen().write(). 4. Sanitization: Absent. - Dynamic Execution (MEDIUM): The
output_filenameparameter in thedownload_cosmic_filefunction is not sanitized before being used in a fileopen()call. This allows for a path traversal attack where a malicious input could overwrite sensitive files outside the intended directory (e.g.,../../.bashrc).
Audit Metadata