system-info
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Arbitrary Code Injection via Unsanitized Arguments. The
system.shscript uses unquoted bash heredocs (<< PYEOF) to generate and execute Python code. User-supplied arguments for--path,--filter,--user, and--topare interpolated directly into the Python source text without sanitization. An attacker can provide crafted inputs (e.g., containing quotes or shell substitutions) to break out of the intended Python string context and execute arbitrary Python or shell commands on the host system.\n- [DATA_EXFILTRATION]: Credential and Secret Exposure. Theenvcommand retrieves and displays all environment variables. This poses a significant security risk as environment variables frequently contain sensitive secrets such asAWS_SECRET_ACCESS_KEY,STRIPE_API_KEY, and database connection strings. Providing a mechanism to dump these variables facilitates immediate credential theft.\n- [EXTERNAL_DOWNLOADS]: Third-Party Dependency. The script relies on thepsutillibrary for data gathering. While it does not download the package automatically, it explicitly instructs the user to install it viapip, which introduces external code that must be verified for safety.
Recommendations
- AI detected serious security threats
Audit Metadata