eliteforge-agent-must-known
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/bootstrap_env.pyexecutes numerous system commands for environment discovery and tool installation. It invokes system-level package managers includingbrew,apt-get,dnf,yum,pacman,zypper,winget, andchocoto install tools likegit,node,java, andmaven. - [PRIVILEGE_ESCALATION]: The skill attempts to modify the system
hostsfile (/etc/hostsorC:\Windows\System32\drivers\etc\hosts). If the file is not directly writable, the script attempts to usesudo cpto apply changes, which requires the environment to have passwordless sudo configured for the current user. - [EXTERNAL_DOWNLOADS]: The skill performs multiple external downloads by triggering package installations through
npm,pipx, andsdkman. It installs thepre-commitpackage and custom vendor CLI tools (eliteforge-poseidon-cli,eliteforge-qingtui-cli). - [CREDENTIALS_UNSAFE]: The script programmatically reads and modifies sensitive configuration files, specifically
~/.npmrcand~/.pip/pip.conf. These files often contain plaintext or hashed authentication tokens. While the script intended purpose is to configure registry mirrors (e.g., atnexus.cisdigital.cn), automated modification of these files carries a risk of accidentally exposing or corrupting stored credentials. - [DATA_EXPOSURE]: The skill reads and modifies global Git configuration settings, including identity information (
user.name,user.email). It also scans the local file system (specificallyskills/eliteforge-*/SKILL.md) to discover and report on environment variables.
Audit Metadata