vm0-computer
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The search examples provided in the skill use bash command substitution
$(curl ...)to iterate over files. This pattern is vulnerable to shell command injection if filenames on the local machine contain metacharacters such as semicolons, backticks, or spaces.\n- [COMMAND_EXECUTION]: The skill dynamically generates a JavaScript proxy file at/tmp/proxy.mjsand executes it usingnode.\n- [EXTERNAL_DOWNLOADS]: The skill installs thewspackage from the public NPM registry at runtime vianpm install ws.\n- [DATA_EXFILTRATION]: The skill is designed to facilitate the transfer of local filesystem data to a remote bridge server using secrets (COMPUTER_CONNECTOR_BRIDGE_TOKEN) and user-defined domains.\n- [REMOTE_CODE_EXECUTION]: Automated scans detected a pattern where output from the local WebDAV proxy is parsed and subsequently used in shell commands, which can lead to arbitrary code execution if the source data is manipulated.
Recommendations
- HIGH: Downloads and executes remote code from: http://127.0.0.1:8080/ - DO NOT USE without thorough review
Audit Metadata