ov-add-data
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates the execution of the
ovCLI tool on the host system, specifically utilizingadd-resource,add-skill, andadd-memorysubcommands.\n- [EXTERNAL_DOWNLOADS]: Fetches content and repository data from external URLs, including vendor-owned repositories (github.com/volcengine/OpenViking) and arbitrary third-party sites (arxiv.org).\n- [DATA_EXFILTRATION]: Documentation provides examples and instructions for the agent to identify and import sensitive local user data, such as personal photos, project documentation, and profile PDFs, into the OpenViking database.\n- [REMOTE_CODE_EXECUTION]: Theov add-skillcommand allows for the dynamic loading and persistence of new agent capabilities from remote or local files, providing a mechanism for runtime expansion of agent logic.\n- [PROMPT_INJECTION]: The skill creates an indirect prompt injection surface by processing untrusted data from URLs and files without sanitization or boundary markers.\n - Ingestion points:
ov add-resourceandov add-skillsubcommands inSKILL.md.\n - Boundary markers: Absent.\n
- Capability inventory: Host CLI execution and network access.\n
- Sanitization: Absent.
Audit Metadata