gate-cli-installer
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
setup.shscript executessudo installto move the downloaded binary into/usr/local/binif the local installation directory is not writable. This allows the script to acquire elevated system privileges during the installation process.\n- [EXTERNAL_DOWNLOADS]: The skill downloads thegate-clibinary, release metadata, and checksums from the vendor's official GitHub repository (github.com/gate/gate-cli).\n- [PROMPT_INJECTION]: TheSKILL.mdinstructions use high-priority directives (e.g., "☐ STOP", "MUST read and strictly follow") and direct the agent to an external URL (https://github.com/gate/gate-skills/blob/master/skills/gate-runtime-rules.md) for mandatory runtime rules, creating an indirect prompt injection surface.\n - Ingestion points:
SKILL.md(via reference to external Markdown rules)\n - Boundary markers: Absent\n
- Capability inventory: Shell script execution (
bash), binary installation, and system path modification instructions.\n - Sanitization: Absent.
Audit Metadata