seo-forge
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/seo-research.shis vulnerable to shell command injection through an unquoted here-document. - Evidence: The script uses
SERP_PAYLOAD=$(cat <<EOF ... "keyword": "$KEYWORD" ... EOF)to construct JSON data. Because theEOFdelimiter is not quoted, the shell performs command substitution on the$KEYWORDvariable before it is processed. - Impact: An attacker or a malicious keyword suggestion could execute arbitrary commands on the host system (e.g., using a keyword like
$(id)or`rm -rf /`). - [EXTERNAL_DOWNLOADS]: The skill uses
curlto communicate with the DataForSEO API (api.dataforseo.com) to fetch live search engine results and keyword data. - Context: This is a core feature of the skill for performing SEO research. The operations are performed over HTTPS and target a well-known service provider.
Recommendations
- AI detected serious security threats
Audit Metadata