acestep-simplemv
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/render-mv.shattempts to automatically install system packages (e.g.,fonts-noto-cjk,google-noto-sans-cjk-fonts) usingapt-get,apk, ordnf. It explicitly attempts to usesudoto acquire root privileges if standard installation fails, which constitutes unauthorized privilege escalation on the host system. - [COMMAND_EXECUTION]: The
scripts/render.mjsfile useschild_process.execSyncto construct and execute shell commands for video rendering. It interpolates variables likeoutput,browserExe, andchromeModeinto a command string. While it attempts to use double quotes, it does not escape the contents, making it vulnerable to command injection if an attacker provides a path or filename containing shell metacharacters (e.g.,"; touch /tmp/pwned #). - [COMMAND_EXECUTION]: The
scripts/render-mv.shscript executesffprobeandffmpegusing variables likeAUDIOandOUTPUTdirectly in shell contexts. These variables are derived from user-supplied CLI arguments and are not sanitized, allowing for potential shell injection via maliciously crafted file paths. - [EXTERNAL_DOWNLOADS]: The skill downloads the
chrome-headless-shellbinary from Google servers if no local browser is detected. While the source (Google) is well-known, the skill documentation warns that this download happens automatically at runtime, which may be unexpected in restricted environments.
Recommendations
- AI detected serious security threats
Audit Metadata