admapix
Fail
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill implements a complex shell-based polling loop to check the status of deep research tasks. This loop uses
echo "$r"to output the raw JSON response from the remote server. If the server returns malicious content containing command substitutions (such as backticks or$()), it could lead to arbitrary command execution on the user's system when the agent processes the script. - [CREDENTIALS_UNSAFE]: The skill instructions contain a hardcoded authentication token (
Authorization: Bearer test-local-token-2026) used for accessing the deep research backend. Hardcoding static credentials in instructions is a major security risk as they can be misused or exposed. - [DATA_EXFILTRATION]: During the 'Deep Research' workflow, the skill is instructed to send the user's
ADMAPIX_API_KEYto the remote endpointdeepresearch.admapix.com. Although this is part of the vendor's infrastructure, it involves transmitting sensitive authentication credentials to an additional remote service. - [EXTERNAL_DOWNLOADS]: The skill fetches data and analysis results from
deepresearch.admapix.com. While this domain belongs to the vendor, the method used to process the downloaded task data introduces significant security concerns. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It is instructed to 'take output.summary (already formatted as bullet points) and present it directly' from the research framework. Since this summary is generated from external data sources by a remote system, it could contain malicious instructions designed to hijack the agent's behavior. The instructions lack boundary markers or sanitization for this external content.
- Ingestion points: The
output.summaryfield from the JSON response atdeepresearch.admapix.com/research/{task_id}(documented inSKILL.md). - Boundary markers: None. The instructions tell the agent to present the content 'directly'.
- Capability inventory: The skill can execute shell commands (
curl,grep,cut,echo), perform network operations, and modify the agent's configuration (openclaw config set). - Sanitization: None. There is no evidence of escaping, validation, or filtering of the remote content before it is processed.
Recommendations
- HIGH: Downloads and executes remote code from: https://deepresearch.admapix.com/research/{task_id} - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata