doppler-secret-validation
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The
scripts/test_api_auth.pyscript retrieves sensitive tokens from Doppler and transmits them to a user-defined API URL usingurllib.request. This pattern directly enables credential exfiltration if the target URL is redirected to an attacker-controlled server. - [COMMAND_EXECUTION]: The
test_env_injectionfunction inscripts/validate_secret.pyexecutes a Python command viapython3 -cusing an unsanitized f-string interpolation for thesecret_namevariable. This allows for arbitrary code execution within the Python interpreter if a malicious secret name (e.g., containing double quotes and system commands) is processed. - [COMMAND_EXECUTION]: The token validation workflow in
SKILL.mdinstructs the user to executepython3 -cwith aTOKEN_VALUEplaceholder. This instruction is highly susceptible to command injection if the token itself contains malicious Python syntax designed to break out of the string literal. - [COMMAND_EXECUTION]: Both bundled scripts (
scripts/test_api_auth.pyandscripts/validate_secret.py) make extensive use ofsubprocess.runto interact with the Doppler CLI. While they use list-based arguments, the lack of input validation on variables likeproject,config, andsecret_nameincreases the attack surface for command manipulation.
Recommendations
- AI detected serious security threats
Audit Metadata