ralph-loop
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
Invoke-OpenEnginefunction inscripts/ralph-loop.ps1executes an external binary using the PowerShell call operator (&). This binary path is determined by the$openBinaryvariable, which can be directly controlled by an attacker via the--open-binarycommand-line argument, potentially leading to arbitrary command execution. - [COMMAND_EXECUTION]: The skill includes logic to locate and execute a secondary script (
cancel-ralph.ps1) when the--stopflag is provided. The path to this script is constructed using theCODEX_HOMEenvironment variable, which could be manipulated to execute a malicious script from an unexpected location. - [EXTERNAL_DOWNLOADS]: The instructions and script error messages promote the installation and use of the
@th0rgal/ralph-wiggumpackage from the NPM registry. This is a third-party dependency from an unverified source that is critical to the 'open' engine's functionality.
Audit Metadata