data-visualization
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill promotes an insecure installation method in
SKILL.md:curl -fsSL https://cli.inference.sh | sh. This executes a remote shell script from an untrusted source with local user privileges, which is a major security risk.\n- [COMMAND_EXECUTION]: The skill relies on theinfshCLI to execute arbitrary code. Examples inSKILL.mdshowinfsh app run infsh/python-executorandinfsh app run infsh/html-to-image, which execute dynamically generated Python and HTML/JavaScript code respectively.\n- [EXTERNAL_DOWNLOADS]: The skill downloads external components fromcli.inference.shanddist.inference.sh, and additional skills vianpx skills add. These sources are not recognized as trusted or well-known.\n- [PROMPT_INJECTION]: The skill exhibits a significant attack surface for indirect prompt injection (Category 8).\n - Ingestion points: Data processed for charts via the
infshcommand inputs inSKILL.md.\n - Boundary markers: No delimiters or warnings to ignore embedded instructions are present.\n
- Capability inventory: The skill allows execution of Python and HTML/JavaScript through the
infshtool.\n - Sanitization: No input validation or sanitization is performed on the data before it is passed to the execution environment.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata