eigen-compute
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): In
scripts/compute-api.js, the_exechelper function usesexecSyncto execute shell commands via string concatenation. Several methods, includinggetAppInfo,getAppLogs,stopApp,startApp, andupgradeApp, pass theappIdparameter directly into the shell command without sanitization. An attacker providing a maliciousappId(e.g.,; rm -rf /) could achieve arbitrary command execution on the host. - DATA_EXFILTRATION (HIGH): The
computeConfigHashfunction inscripts/compute-api.jstakes an array of file paths and reads their contents usingfs.readFileSync. This provides a primitive for unauthorized reading of any sensitive file on the system (e.g.,~/.ssh/id_rsa,/etc/passwd) if the agent is prompted to process malicious paths. - EXTERNAL_DOWNLOADS (MEDIUM): The skill requires the installation of the
@layr-labs/ecloud-clipackage via npm. The@layr-labsorganization is not included in the predefined list of trusted external sources, making this an unverifiable dependency.
Recommendations
- AI detected serious security threats
Audit Metadata