orchestrating-datacloud
Fail
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill's setup process fetches external resources from a personal GitHub account (
Jaganpro) rather than the official Salesforce (forcedotcom) or other trusted repositories. Specifically,scripts/bootstrap-plugin.shcloneshttps://github.com/Jaganpro/sf-cli-plugin-data360.gitandreferences/plugin-setup.mdreferences scripts fromhttps://raw.githubusercontent.com/Jaganpro/sf-skills/. - [REMOTE_CODE_EXECUTION]: The skill facilitates the execution of remote code in two ways:
scripts/bootstrap-plugin.shclones an external repository, runsyarn installandnpx tsc, and then links it as a Salesforce CLI plugin usingsf plugins link .. This integrates unverified code into the user's CLI environment.references/plugin-setup.mdexplicitly instructs the user to execute a remote Python script via the dangerous pattern:curl -sSL https://raw.githubusercontent.com/Jaganpro/sf-skills/main/tools/install.py | python3 -.- [COMMAND_EXECUTION]: The script
scripts/verify-plugin.shcontains a command injection vulnerability. It iterates through a list of commands and executes them usingbash -lc "${command}". Thecommandvariable is constructed by interpolating the${ORG}argument without sanitization (e.g.,sf data360 connection connector-list -o "${ORG}"), which allows an attacker to execute arbitrary shell commands by providing a malicious org alias.
Recommendations
- AI detected serious security threats
Audit Metadata