ohmg
Warn
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill relies on
bunx oh-my-agto download and execute code directly from a remote package registry. This executes arbitrary logic from an unverified third-party source at runtime. - Evidence: Found in
SKILL.mdinstructions:bunx oh-my-ag,bunx oh-my-ag doctor,bunx oh-my-ag dashboard. - [COMMAND_EXECUTION]: The skill performs multiple shell operations including spawning background processes and network bridges.
- Evidence:
bunx oh-my-ag dashboard &andbunx oh-my-ag bridge http://localhost:12341/sseinSKILL.md. - [EXTERNAL_DOWNLOADS]: The skill uses
bunxto fetch external dependencies from the npm registry without prior verification or version pinning. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection and command injection because user-provided task descriptions are interpolated directly into shell commands used to spawn agents.
- Ingestion points: Task descriptions passed to
oh-my-ag agent:spawn(e.g., "Set up Unity3D build pipeline", "Implement auth API") inSKILL.md. - Boundary markers: None detected; instructions are passed as raw strings.
- Capability inventory: The skill uses
Bash,Write, andbunxwhich allows for arbitrary code execution if task strings contain shell metacharacters. - Sanitization: No evidence of input validation or escaping for the
agent:spawntask arguments.
Audit Metadata