hyperagent
Warn
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/common.pydefinesrun_shell_commandwhich usessubprocess.runwithshell=Trueto execute commands. This utility is used byscripts/run_task.pyandscripts/common.pyto interact with the system environment and run task benchmarks. - [REMOTE_CODE_EXECUTION]: The
scripts/run_task.pyscript executes a user-provided command (thetask_command) multiple times during evaluation trials. This framework is explicitly designed to facilitate the execution of code generated or modified by the agent itself. - [PROMPT_INJECTION]: The skill architecture creates an attack surface for indirect prompt injection. 1. Ingestion points: The meta-agent reads
archive.jsonlandmemory.jsonlcontaining previously generated code and performance history. 2. Boundary markers: No delimiters or explicit instructions to ignore embedded commands are present when loading variants. 3. Capability inventory:run_task.pyandcommon.pyfacilitate subprocess calls for shell command execution. 4. Sanitization: No validation or filtering of generated content is performed before it is re-analyzed or executed.
Audit Metadata