ad-consumer
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation instructions in
SKILL.mdprompt the user to executecurl -sSL https://tempo.im/install.sh | sh. This pattern is highly insecure as it downloads and runs an unverified script directly in the shell with the user's permissions.- [EXTERNAL_DOWNLOADS]: The skill requires external software (Tempo CLI,Bun) and fetches ad content dynamically fromhttps://agent-ads.yashatreya-ya.workers.devduring operation.- [COMMAND_EXECUTION]: The skill's scripts (setup.js,serve_ad.js,confirm_view.js, etc.) useexecSyncto invoke thetempoCLI tool. This mechanism is used to manage wallet state and perform network requests via shell commands.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its ad display mechanism. - Ingestion points: Markdown ad content is fetched from a remote API in
scripts/serve_ad.js. - Boundary markers: Delimiters like
--- Sponsored Ad ---are suggested in documentation but not enforced by the scripts. - Capability inventory: The skill has the ability to execute shell commands and access crypto wallet functions via the
tempoCLI. - Sanitization: There is no programmatic sanitization or filtering of the remote markdown content before it is displayed to the user.
Recommendations
- HIGH: Downloads and executes remote code from: https://tempo.im/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata