api-authentication
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Vulnerability in
scripts/setup-auth.shdue to unquoted heredoc usage. The shell evaluates variables within<< EOF, allowing command substitution if the$API_KEYvariable contains backticks or$(). Evidence: Line 79-84 inscripts/setup-auth.sh.\n- [COMMAND_EXECUTION] (HIGH): Vulnerability inscripts/test-connection.shvia unsafe environment loading. The use ofexport $(...)withxargson.envfile contents allows execution of embedded commands if the file is manipulated. Evidence: Line 17 inscripts/test-connection.sh.\n- [EXTERNAL_DOWNLOADS] (MEDIUM):scripts/install-sdk.shperforms automated installation of dependencies from NPM and PyPI registries (elevenlabs,dotenv) without integrity checks or version pinning.\n- [PROMPT_INJECTION] (HIGH): High risk of Indirect Prompt Injection (Category 8). An attacker can provide a malicious 'API key' through external data that results in local command execution when processed by the agent. 1. Ingestion:scripts/setup-auth.shvia command line arguments. 2. Boundary markers: Absent. 3. Capability inventory:Bashtool, file-write, and network access viacurl. 4. Sanitization: Absent; input is directly interpolated into shell commands.
Recommendations
- AI detected serious security threats
Audit Metadata