asciinema-recorder

Warn

Audited by Gen Agent Trust Hub on Apr 4, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes the Bash tool to perform environment checks and directory management, including the execution of 'which', 'basename', 'date', and 'mkdir -p'.
  • [COMMAND_EXECUTION]: Specifically includes a 'sudo apt install' command to install dependencies on Linux systems, which involves privilege escalation.
  • [EXTERNAL_DOWNLOADS]: Facilitates the acquisition of the 'asciinema' CLI through public package registries including Homebrew, APT, and PIP.
  • [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface where external data is interpolated into shell commands generated for the user.
  • Ingestion points: The workspace name is derived from the current working directory via 'basename', and recording titles or paths are collected from user input via 'AskUserQuestion'.
  • Boundary markers: The skill uses Bash heredocs for internal script execution but provides no boundary markers or instructions to ignore embedded commands within the generated recording command.
  • Capability inventory: The skill possesses the ability to execute shell commands via the Bash tool and create directories.
  • Sanitization: There is no evidence of sanitization or escaping for variables such as '${WORKSPACE}' or custom titles, potentially allowing shell metacharacters to alter the behavior of the generated command.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 4, 2026, 09:51 AM