graph-easy
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
references/preflight-check.mdcontains installation instructions that involve downloading a script from a remote URL and piping it directly into the Perl interpreter (e.g.,curl -L https://cpanmin.us | ... perl -). - [COMMAND_EXECUTION]: The skill utilizes the Bash tool for operational tasks and setup. The
references/preflight-check.mdfile explicitly guides the user to executesudocommands for system package installation on Linux platforms. - [EXTERNAL_DOWNLOADS]: The skill's preflight documentation encourages downloading external dependencies from non-whitelisted domains, including the
cpanminusinstaller and theGraph::EasyPerl module from CPAN. - [CREDENTIALS_UNSAFE]: The wrapper script
scripts/graph-easycontains a hardcoded absolute file path (/Users/terryli/.local/...) which discloses a local system username, indicating a lack of portability and potential information leakage.
Recommendations
- AI detected serious security threats
Audit Metadata