opencode
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The utility function
execute_cmdinopencode_utils.pyusessubprocess.runwithshell=True. Inlist_sessions.py, this function is used to execute commands where the project path is interpolated directly into the shell string. If the project path returned by the local OpenCode service contains shell metacharacters, it could lead to arbitrary command execution. - [EXTERNAL_DOWNLOADS]: The skill relies on the
opencode_aiPython package. This is a vendor-provided SDK from volcengine that manages communication with the OpenCode service. - [PERSISTENCE_MECHANISMS]: The
start_opencodefunction inopencode_utils.pylaunches theopencode serveprocess usingos.setsidon Linux/macOS orDETACHED_PROCESSon Windows. This allows the process to completely detach from the parent and continue running in the background after the skill has finished execution. - [INDIRECT_PROMPT_INJECTION]: The skill reads and displays message content from OpenCode sessions, creating a surface for indirect instructions.
- Ingestion points: Fetches session messages from the local service at
http://127.0.0.1:4096via theopencode_aiclient inlist_sessions.py. - Boundary markers: Absent. Message text is joined and printed directly without delimiters.
- Capability inventory: Includes
subprocess.runwithshell=Trueinopencode_utils.py. - Sanitization: No sanitization or escaping of session message content or project paths is performed before processing.
- Ingestion points: Fetches session messages from the local service at
Audit Metadata