chemax-fallout4
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [Dynamic Execution] (HIGH): The
inject_command.pyscript performs memory injection into theFallout4.exeprocess. It uses thepymemlibrary to allocate memory, write raw x64 shellcode, and execute it via a remote thread. This bypasses standard process boundaries and allows for arbitrary code execution within another application's memory space.\n- [Privilege Escalation] (HIGH): The skill consistently usespowershell -ExecutionPolicy Bypassin its setup and bridge scripts. This disables a key security feature designed to prevent the execution of untrusted scripts. Furthermore, process injection typically requires administrative privileges, encouraging users to run the agent with elevated permissions.\n- [Unverifiable Dependencies] (MEDIUM): The skill relies onpymem, an external third-party library for its core injection functionality. This introduces a supply-chain risk as the dependency is not from a verified or standard source for agent skills.\n- [Data Exposure] (LOW): Thebridge.ps1script uses the system clipboard to transfer data into the game. While used here for game commands, the ability to read and write to the clipboard is a common vector for sensitive data exposure or manipulation.
Recommendations
- AI detected serious security threats
Audit Metadata