alibabacloud-dataworks-workspace-manage
Fail
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides instructions to download and execute an installation script from
https://aliyuncli.alicdn.com/install.shvia a pipe to bash. This source is a legitimate vendor CDN for Alibaba Cloud and represents the official distribution method for their CLI tool. - [EXTERNAL_DOWNLOADS]: The skill references external downloads from
aliyuncli.alicdn.com, which is recognized as an official repository for the author's cloud tooling. - [COMMAND_EXECUTION]: The skill is designed to interact with Alibaba Cloud services by executing
aliyunCLI commands on the host environment, which is the intended functional purpose of the skill. - [PROMPT_INJECTION]: The skill processes untrusted user input and incorporates it into shell commands, creating a potential surface for indirect prompt injection or command injection if inputs are not properly handled by the agent.
- Ingestion points: User-supplied strings for parameters such as
--Name,--DisplayName,--Description, and--UserIdin the workflows defined inSKILL.md. - Boundary markers: The skill includes a 'Parameter Confirmation' requirement in
SKILL.md, instructing the agent to verify all user-customizable parameters with the user before executing any command. - Capability inventory: The skill uses the Aliyun CLI to perform CRUD operations on DataWorks resources across all workflows in
SKILL.mdand detailed inreferences/related-apis.md. - Sanitization: No technical sanitization or input-escaping instructions are present in the skill files; the process relies on the agent's internal safety filters and the manual approval step provided by the user.
Recommendations
- HIGH: Downloads and executes remote code from: https://aliyuncli.alicdn.com/install.sh - DO NOT USE without thorough review
Audit Metadata