jlink
Warn
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill leverages the
subprocessmodule across several scripts (jlink_exec.py,jlink_gdb.py,jlink_rtt.py,jlink_swo.py) to run external development tools likeJLink.exe,JLinkGDBServerCL.exe, andarm-none-eabi-gdb. - [COMMAND_EXECUTION]: The
jlink_gdb.pyscript enables the execution of arbitrary GDB commands. Because GDB includes a built-inshellcommand, this functionality can be abused to execute any command on the host operating system. - [COMMAND_EXECUTION]: The
jlink_swo.pyscript accepts a command array via the--viewer-cmdparameter (or through theswo_commandconfiguration field) and executes it directly usingsubprocess.Popen, allowing for the execution of arbitrary processes. - [COMMAND_EXECUTION]: In
jlink_exec.py, J-Link command scripts are generated by interpolating user-supplied arguments into templates. These inputs are not sanitized for newline characters, which could allow a malicious actor to inject additional J-Link commands into the generated script. - [DATA_EXFILTRATION]: The combined capabilities of arbitrary command execution and file access (intended for firmware flashing) provide a vector for reading sensitive local files and transmitting them to external servers.
- [COMMAND_EXECUTION]: The
jlink_runtime.pyfile contains logic to hide subprocess windows on Windows usingCREATE_NO_WINDOWandSW_HIDE. While intended to provide a cleaner CLI experience, this also conceals the execution of these processes from the user's view.
Audit Metadata