advanced_tools
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
regex_replacefunction inscripts/mutation.pyis vulnerable to command injection. It constructs asedexpression using string interpolation of thepatternandreplacementarguments. In environments using GNU sed, an attacker can inject theeflag into the substitution command (e.g., by crafting a replacement string likepayload|e) to execute arbitrary shell commands. - [COMMAND_EXECUTION]: The
regex_replacetool inscripts/mutation.pyexplicitly includes anoutsideparameter that, when set totrue, allows the agent to modify files outside the project root. This bypasses the intended security sandbox and enables the modification of sensitive system files, configuration files, or user profiles (e.g.,~/.bashrc). - [DATA_EXFILTRATION]: The
smart_searchandsmart_findtools inscripts/search.pyresolve thesearch_rootparameter without verifying that the resulting path is within the project boundaries. This allows an agent to search and retrieve content from any directory the process can access, potentially exposing credentials, SSH keys, or other sensitive system data. - [PROMPT_INJECTION]: The skill represents a significant surface for indirect prompt injection.
- Ingestion points:
scripts/search.py(viasmart_searchandsmart_find) andscripts/mutation.py(viabatch_replace) ingest file contents from the local filesystem. - Boundary markers: None. The tools do not use delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory: The skill has powerful capabilities including arbitrary command execution via
subprocess(rg, fd, sed) and direct file writing viaPath.write_text. - Sanitization: None. Data retrieved from the codebase is passed directly back to the agent context without escaping or validation.
Recommendations
- AI detected serious security threats
Audit Metadata