request-recorder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill's primary purpose is to capture external data (HTTP payloads) and feed it to the agent via the
logcommand, creating a significant injection surface. - Ingestion points: The
runServerfunction inrecorder-cli.jscaptures any incoming data viareq.on('data')on the configured port. - Boundary markers: No delimiters or warnings are used when printing logs; the agent receives raw data from external sources.
- Capability inventory: The skill allows the agent to execute shell commands via
Bash(node recorder-cli.js), creating a high-privilege execution environment for any instructions parsed from the logs. - Sanitization: There is no sanitization, escaping, or validation of the recorded payloads before they are output to the terminal.
- Persistence Mechanism (HIGH): The skill uses
pm2(a process manager) to daemonize the HTTP service (startcommand). This allows the process to persist in the background independently of the agent session. - Data Exposure (HIGH): The
runServerfunction callsserver.listen(port)without specifying a host (like127.0.0.1). In Node.js, this defaults to listening on all interfaces (0.0.0.0or::), exposing the captured data and the log endpoint (/_logs) to anyone on the local network. - External Dependencies (MEDIUM): The skill relies on the
pm2package. Whilepm2is a common tool, its installation and usage for background persistence should be reviewed to ensure it aligns with the host's security policy.
Recommendations
- AI detected serious security threats
Audit Metadata