openrouter-config-validator
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Dynamic Execution (HIGH): The scripts
test-routing.sh,test-fallback.sh,troubleshoot.sh, andvalidate-env-config.shutilize thesourcecommand on file paths provided as arguments. This allows for arbitrary command execution (RCE) within the agent's shell environment becausesourceinterprets and executes the content of the target file as shell code, rather than simply parsing it for key-value pairs. - Data Exposure & Exfiltration (MEDIUM): The skill's primary function involves handling the
OPENROUTER_API_KEYand transmitting it viacurltohttps://openrouter.ai. While this domain is relevant to the skill's purpose, it is not on the trusted whitelist, and the ability to execute arbitrary code via thesourcevulnerability significantly increases the risk that these credentials could be exfiltrated to an attacker-controlled endpoint. - Indirect Prompt Injection (MEDIUM):
- Ingestion points: Data is ingested from the OpenRouter API (model lists, usage stats) via
curlincheck-model-availability.sh,check-provider-status.sh, andanalyze-usage.sh. - Boundary markers: No delimiters or 'ignore instructions' warnings are present in the scripts' output.
- Capability inventory: The skill has access to Bash execution, file system operations (Read/Write/Glob), and network access.
- Sanitization: While
jqis used for JSON parsing, the resulting text is directly output to the agent, potentially allowing malicious API responses to influence the agent's subsequent actions.
Recommendations
- AI detected serious security threats
Audit Metadata