lokei
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
lokei setupto perform high-risk system modifications, including configuring a local DNS resolver and establishing port forwarding rules (pfctlon macOS oriptableson Linux) for ports 80 and 443.\n- [COMMAND_EXECUTION]: Thelokei service installcommand allows for the installation of persistent background services aslaunchdorsystemddaemons, which maintains the tool's execution across system restarts.\n- [COMMAND_EXECUTION]: During the setup process, the skill triggers certificate generation and trust operations that modify the OS keychain, representing a privilege escalation vector that requires administrative access.\n- [EXTERNAL_DOWNLOADS]: The skill instructs the agent to download and install thelokeipackage globally from the NPM registry if it is missing from the environment.\n- [DATA_EXFILTRATION]: Through thelokei shareandlokei run --exposecommands, the skill can create public tunnels that route local traffic throughrelay.lokei.dev, potentially exposing local development data to the public internet.\n- [PROMPT_INJECTION]: The skill provides access to network logs and request metadata, which constitutes an indirect prompt injection surface if malicious external data is processed.\n - Ingestion points: Network traffic logs and request details accessed via
lokei logsorlokei inspect.\n - Boundary markers: None. The skill does not implement delimiters or 'ignore' instructions for log content.\n
- Capability inventory: The agent has access to the
Bashtool, allowing it to execute commands if influenced by malicious log data.\n - Sanitization: No content filtering or escaping is described for the log viewing functionality.
Audit Metadata