ida-domain-scripting
Fail
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
run.pyscript executes agent-generated Python code usingsubprocess.run. This allows the skill to perform complex reverse engineering tasks but also enables the execution of arbitrary code on the host system within the IDA Pro environment. - [EXTERNAL_DOWNLOADS]: The
setup.pyscript clones theida-domainrepository from GitHub (https://github.com/HexRaysSA/ida-domain.git) and fetches release information from the GitHub API. These resources are owned by the skill's author. Additionally, the setup script provides documentation recommending the installation of theuvpackage manager via a piped shell command fromastral.sh. - [REMOTE_CODE_EXECUTION]: The skill facilitates the execution of dynamically generated scripts, creating a potential surface for indirect prompt injection when analyzing untrusted binaries.
- Ingestion points: Target binary files or IDA database files (.i64/.idb) processed by the skill via
run.py. - Boundary markers: Absent; there are no specific markers or instructions to prevent the agent from being influenced by data found within analyzed binaries.
- Capability inventory: The skill has the ability to write files to
/tmpand execute arbitrary Python code usingsubprocess.runinrun.py. - Sanitization: No validation or sanitization is performed on the data extracted from binary files before it is processed by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata