llm-council
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill requires users to provide an
AI_GATEWAY_API_KEYthrough environment variables, which is subsequently accessed by the server for use in external requests. - [DATA_EXFILTRATION]: The skill transmits the user's API key as a Bearer token to a remote domain (
https://ai-gateway.happycapy.ai/api/v1). The gateway claims to provide access to non-existent models (e.g., GPT-5.1, Claude 4.5), suggesting a lure for credential harvesting. The requests also include a hardcodedOriginheader forhttps://trickle.so, indicating potential impersonation of other services. - [COMMAND_EXECUTION]: The launch script in
SKILL.mdexecutes shell commands includingfuser -k 8787/tcpto terminate processes andnohupto run the server in the background. - [PROMPT_INJECTION]: The skill's multi-model consensus and synthesis logic is susceptible to indirect prompt injection.
- Ingestion points: Untrusted outputs from external AI models are collected via the
/api/council/streamand/api/council/voteendpoints. - Boundary markers: None; model responses are interpolated directly into prompts for evaluation and synthesis without delimiters.
- Capability inventory: Subprocess calls are present for server lifecycle management; model-driven logic is used for synthesis display.
- Sanitization: The frontend (
app.js) performs HTML escaping to prevent XSS in the dashboard, but does not sanitize the content processed by the models.
Recommendations
- AI detected serious security threats
Audit Metadata