chemax-fallout4

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
  • [Dynamic Execution] (HIGH): The inject_command.py script performs memory injection into the Fallout4.exe process. It uses the pymem library to allocate memory, write raw x64 shellcode, and execute it via a remote thread. This bypasses standard process boundaries and allows for arbitrary code execution within another application's memory space.\n- [Privilege Escalation] (HIGH): The skill consistently uses powershell -ExecutionPolicy Bypass in its setup and bridge scripts. This disables a key security feature designed to prevent the execution of untrusted scripts. Furthermore, process injection typically requires administrative privileges, encouraging users to run the agent with elevated permissions.\n- [Unverifiable Dependencies] (MEDIUM): The skill relies on pymem, an external third-party library for its core injection functionality. This introduces a supply-chain risk as the dependency is not from a verified or standard source for agent skills.\n- [Data Exposure] (LOW): The bridge.ps1 script uses the system clipboard to transfer data into the game. While used here for game commands, the ability to read and write to the clipboard is a common vector for sensitive data exposure or manipulation.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:38 PM