autoresearch-agent
Fail
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/autoresearchinvokes theclaudeCLI using the--dangerously-skip-permissionsflag. This flag is designed to suppress all user confirmation prompts for high-risk actions, including shell command execution, file modifications, and network requests. - [COMMAND_EXECUTION]: The skill translates user-supplied subcommands and flags into a prompt for the sub-agent. Parameters such as
--guard <cmd>(used in thefixsubcommand) allow for the execution of arbitrary shell commands. Because permissions are skipped, these commands will run automatically without the user's knowledge or approval. - [DATA_EXFILTRATION]: By bypassing the security gates of the Claude CLI, the skill enables potential data exfiltration. A malicious prompt or a sub-task could use standard tools like
curlorwgetto transmit environment variables, credentials, or source code to external servers. - [COMMAND_EXECUTION]: The environment variable
CLAUDE_EXTRA_ARGSis appended to the command array without quoting (e.g.,CMD+=($CLAUDE_EXTRA_ARGS)). This allows for flag injection into theclaudeprocess, which could be used to manipulate the sub-agent's behavior if the environment is compromised.
Recommendations
- AI detected serious security threats
Audit Metadata