code-audit
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
references/core/audit.shautomatically attempts to install thepyyamlPython package usingpip installif it is not found. This occurs silently (-q) and without version constraints, introducing a potential supply chain risk during the skill's execution. - [COMMAND_EXECUTION]: The skill frequently executes shell commands via the
Bashtool to run auditing logic and setup scripts. This includes the execution ofaudit.shand the provided Python enginesecurity_controls_engine.py. - [EXTERNAL_DOWNLOADS]: The skill's Docker setup documentation (
references/core/docker_verification.md) provides instructions to download and execute scripts from external sources, such assh.rustup.rsanddot.net, using the high-riskcurl | shpattern. Although these originate from well-known technology organizations, the method of execution is a significant security concern. - [PROMPT_INJECTION]: The
agent.mdfile contains instructions designed to override the agent's default operational boundaries, directing it to use an aggressive 'GO SUPER HARD' scanning posture and to exhaustively iterate through all attack vectors. - [DATA_EXFILTRATION]: Multiple reference files, including
references/languages/java_practical.mdandreferences/core/poc_generation.md, contain hardcoded references to DNS logging domains such asdnslog.cn. These services are commonly used for data exfiltration during Out-of-Band (OOB) vulnerability testing. While legitimate for auditing, they represent a potential leak path for sensitive data if the agent executes these payloads against real environments. - [SAFE]: The automated scanner's identification of
sh.rustup.rsas a botnet URL is confirmed as a false positive, as it is the official installation service for the Rust programming language.
Recommendations
- Contains 3 malicious URL(s) - DO NOT USE
Audit Metadata