domain-hunter
Warn
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
references/spaceship-api.mdcontains instructions for the agent to extractSPACESHIP_API_KEYandSPACESHIP_API_SECRETfrom the user's~/.zshrcfile using shell commands (grepandcut). - [COMMAND_EXECUTION]: The skill instructions and documentation include the execution of various shell commands:
whoisqueries to check domain availability inSKILL.mdand the example usage.python scripts/domain_checker.pyto perform bulk availability checks.curloperations inreferences/spaceship-api.mdto interact with the Spaceship API for registration, DNS management, and account operations.- [DATA_EXFILTRATION]: The skill is configured to read local credentials from shell configuration files and transmit them to an external endpoint (
https://spaceship.dev/api). While this is functional for the intended use-case (API interaction), it follows a pattern of local secret harvesting and remote transmission. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection through Step 3 (Find Promo Codes) in
SKILL.md. - Ingestion points: The skill uses
WebSearchto fetch content fromx.comandreddit.com(e.g., searching for promo codes and coupons). - Boundary markers: The instructions lack explicit delimiters or warnings to ignore instructions embedded within the search results.
- Capability inventory: The skill has the capability to execute shell commands (
whois), perform network operations (curl), and open URLs (open). - Sanitization: There is no evidence of sanitization for the search result content before it is processed by the agent.
- Risk: An attacker could post a malicious "promo code" on social media that contains instructions to exfiltrate data or execute dangerous commands if interpreted by the agent.
Audit Metadata