x-cmd-network
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill provides wrappers for
nmap,arp,dns, androute. This allows the agent to execute arbitrary network scans and modify system-level network configurations. Subprocess calls are made to thexbinary which further executes these utilities. - DATA_EXFILTRATION (HIGH): Access to
nmapallows for scanning internal networks. The ability to read ARP tables and routing information exposes internal network topology. Thetpingutility usescurl, which can be used to send internal data to external endpoints. - INDIRECT PROMPT INJECTION (HIGH): Mandatory Evidence Chain: 1. Ingestion: Processes data from external network entities (DNS responses, ARP tables) via
x dns currentandx arp. 2. Boundary markers: Absent. 3. Capability inventory:x nmap,x dns set,x route(high-privilege write/recon). 4. Sanitization: Absent. Maliciously crafted network data could influence agent behavior or exploit parsing logic in the TUI visualizers. - EXTERNAL_DOWNLOADS (LOW): Relies on the
x-cmdecosystem and external binaries likenmap. Documentation links tox-cmd.com, which is an external, non-whitelisted domain.
Recommendations
- AI detected serious security threats
Audit Metadata