skill-system-gate
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/gate_validate.pyimplements a rule engine that executes arbitrary shell commands. Therun_command_rulefunction extracts acommandstring from a YAML configuration file and executes it usingsubprocess.run(["bash", "-lc", command]). Because thevalidateoperation allows the agent to specify the path to thisrulesfile, an attacker can achieve arbitrary command execution by providing a malicious configuration file. - [COMMAND_EXECUTION]: The
run_eda_contract_rulefunction inscripts/gate_validate.pyallows the user to specify ascriptpath within the gate configuration which is then executed viapython3. This allows for arbitrary script execution if the configuration file is controlled by an attacker. - [COMMAND_EXECUTION]: The shell scripts
scripts/check_registry.shandscripts/validate_exp.share vulnerable to Python code injection. They interpolate the$EXP_NAMEshell variable directly into a Python command string passed topython3 -c. A crafted experiment name containing quotes and Python code (e.g.,'); import os; os.system('...) can execute arbitrary logic within the Python interpreter. - [COMMAND_EXECUTION]: The
validateoperation inSKILL.mdandSKILL.spec.yamlaccepts arulesparameter of typepath. Since the content of the file at this path dictates the commands executed by the host system, this input represents a high-risk vector for host compromise if the agent is directed to process an untrusted file.
Recommendations
- AI detected serious security threats
Audit Metadata