sem-integration
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Recommends fetching a binary from an external GitHub repository not identified as a trusted source.
- Evidence:
modules/detection.mdsuggests downloading fromhttps://github.com/Ataraxy-Labs/sem/releases/latest/download/sem-x86_64-unknown-linux-gnu. - [REMOTE_CODE_EXECUTION]: Instructs the agent to download, grant execution permissions, and run a third-party binary, bypassing standard package management verification.
- Evidence:
modules/detection.mdusescurlfollowed bychmod +xon the downloadedsembinary. - [COMMAND_EXECUTION]: Provides instructions for installing third-party software using system package managers (
cargo,brew). - Evidence:
modules/detection.mdlistscargo install --locked sem-cliandbrew install sem-cli. - [PROMPT_INJECTION]: The skill processes
git diffoutput, creating a surface for indirect prompt injection if the files being diffed contain malicious instructions. - Ingestion points:
modules/fallback.mdandSKILL.mdread output fromgit diffandsem diffcommands. - Boundary markers: Absent; the patterns do not include delimiters or instructions for the agent to ignore instructions embedded within the diff content.
- Capability inventory: The skill uses
git,grep,rg, and system package managers. - Sanitization: Absent; the skill does not perform validation or escaping of the diff data before processing.
Audit Metadata