ralph-loop
Warn
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs shell commands by interpolating file contents using subshells (e.g.,
$(cat PROMPT.md)). This pattern is susceptible to command injection if the source files are manipulated to include shell metacharacters or malicious commands. - [COMMAND_EXECUTION]: Instructions within the skill promote the use of auto-approval flags that intentionally disable security prompts, such as Codex's
--yoloflag and Claude Code's--dangerously-skip-permissions. These settings remove essential guardrails and allow autonomous agents to perform potentially destructive actions without user oversight. - [REMOTE_CODE_EXECUTION]: The skill's core function is the invocation of autonomous coding agents which fetch instructions from remote AI providers and execute them locally. This creates a chain of execution where the security of the local environment depends entirely on the outputs of external models.
- [COMMAND_EXECUTION]: The skill leverages the
execandprocesstools with full TTY support (pty: true) to manage interactive CLI sessions. While necessary for the stated purpose, this provides a highly capable execution environment that an orchestrated agent could abuse if its objectives are misaligned or compromised.
Audit Metadata