deep-analysis
Fail
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
run.pyscript andscripts/lib/playwright_fallback.pyusesubprocess.runto execute shell commands for installing system dependencies and downloading external binaries. Specifically,run.pyattempts to install the Cloudflare Tunnel binary to/usr/local/bin/usingsudo, which represents a privilege escalation risk. - [REMOTE_CODE_EXECUTION]: The skill includes logic to automatically install missing Python dependencies listed in
requirements.txtviapip install. While it attempts to use trusted mirrors, the automated execution of package installation at runtime is a known vector for supply chain attacks. - [EXTERNAL_DOWNLOADS]: The skill fetches data and software from various external domains, including GitHub (
github.com), Cloudflare (trycloudflare.com), and multiple financial data providers. It downloads thecloudflaredbinary directly from GitHub if not present on the system. - [PROMPT_INJECTION]: The skill fetches news headlines, social media posts, and search snippets from platforms like Xueqiu, Guba, and DuckDuckGo. This untrusted content is interpolated into agent prompts for multi-investor role-play analysis. While the skill instructs the agent to fact-check, it lacks robust boundary markers (e.g., XML tags or delimiters) to sanitize this external data against indirect prompt injection.
Recommendations
- AI detected serious security threats
Audit Metadata