tutor
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The files
init.pyandsample/geometry_proof/render.shcontain instructions to download a shell script fromhttps://astral.sh/uv/install.shand pipe it directly into the shell (sh). This 'curl | sh' pattern is a significant security risk as it executes unverified remote code. Althoughastral.shis the official site for theuvtool, it is not on the whitelisted Trusted External Sources.\n- [REMOTE_CODE_EXECUTION] (HIGH): The skill performs unverified remote code execution during the initialization process to install dependencies. This could be exploited if the remote source or the transit path is compromised.\n- [COMMAND_EXECUTION] (MEDIUM): Several scripts, includinginit.py,scripts/render.py, andscripts/validate_audio.py, usesubprocess.runto execute system commands such asmanim,ffmpeg, andffprobe. While these are functional requirements, they interact directly with the host operating system and filesystem.\n- [DATA_EXFILTRATION] (LOW): Thescripts/generate_tts.pyscript uses theedge-ttslibrary to send text data to Microsoft's servers for speech synthesis. While Microsoft is a known entity, the specific network operation targets a non-whitelisted domain and involves sending user-provided text externally.\n- [PROMPT_INJECTION] (LOW): The skill possesses an indirect prompt injection surface. Ingestion points:audio_list.csvand分镜.mdare parsed at runtime. Boundary markers: Absent. Capability inventory: Usessubprocess.runto executemanimbased on logic derived from the parsed data. Sanitization: There is no significant sanitization of the input text before it is processed or used in terminal output displays.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata