autocli-web-scraping
Fail
Audited by Gen Agent Trust Hub on May 18, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's primary installation method involves piping a remote shell script directly from an untrusted personal GitHub repository (
nashsu/autocli) to the system shell (curl -fsSL ... | sh). This allows for arbitrary code execution with the user's current permissions without any integrity verification. - [EXTERNAL_DOWNLOADS]: The skill facilitates the download of binary executables and scripts from an unverified third-party GitHub repository. These downloads lack version pinning or cryptographic signatures, making the system vulnerable to supply chain attacks or malicious updates at the source.
- [COMMAND_EXECUTION]: The skill documentation encourages the use of
sudoto move third-party binaries into system-wide executable paths (/usr/local/bin/), granting the software elevated privileges. It also uses commands to append shell completions to sensitive startup files like~/.bashrcand~/.zshrc, which can be abused for persistence. - [DATA_EXFILTRATION]: The tool manages high-value sensitive data, including browser session tokens for 55+ social media platforms and a custom API token stored in
~/.autocli/config.json. The ability to define custom API endpoints viaAUTOCLI_API_BASEprovides a mechanism for redirecting this sensitive data to attacker-controlled infrastructure. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting untrusted data from various external websites (e.g., Twitter, Reddit). There are no boundary markers or sanitization procedures described to prevent malicious instructions embedded in web content from influencing the agent's behavior during data processing.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/nashsu/autocli/main/scripts/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata