skill-autoinstaller
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
discover.jsscript is vulnerable to command injection through the--repoand--dircommand-line arguments. - Evidence: The script interpolates the
url(containing the unsanitizedrepoargument) directly into agit clonecommand viaexecSync. - Evidence: The
findSkillFilesandmanualSearchfunctions use the unsanitizeddirargument directly inexecSynccalls forfindandls -lacommands. - [COMMAND_EXECUTION]: The
evaluate.jsscript is vulnerable to command injection via the--pathargument. - Evidence: Multiple functions, including
checkPathTraversal,checkDangerousPatterns,checkSecrets,checkNetworkCalls, andcheckFileOperations, interpolate theSKILL_PATHvariable directly into shell commands likefindandreadlinkexecuted viaexecSync. - [EXTERNAL_DOWNLOADS]: The skill clones external GitHub repositories to a temporary directory for processing.
- Evidence:
discover.jsusesgit cloneto fetch repositories from GitHub based on user-supplied strings. - [REMOTE_CODE_EXECUTION]: The skill provides a framework for automatically installing and executing code from external repositories.
- Evidence: Documentation in
SKILL.mdoutlines installation strategies includingnpm install,pip install,apt-get install, and the execution of arbitrary installation scripts found within the downloaded repositories.
Recommendations
- AI detected serious security threats
Audit Metadata