skills/huangwb8/skills/awesome-code/Gen Agent Trust Hub

awesome-code

Warn

Audited by Gen Agent Trust Hub on May 11, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The scripts/cache.py script implements a caching mechanism using the Python pickle library. Specifically, the pickle.load() function is used to read data from the local .awesome-code/cache directory. Unsafe deserialization via pickle is a known security risk that can allow for arbitrary code execution if the cached data is manipulated by a malicious actor.
  • [COMMAND_EXECUTION]: Several scripts, including scripts/test_runner.py, scripts/code_analyzer.py, and scripts/performance_benchmark.py, utilize the subprocess.run() method to execute development tools and tests. While these commands are configured using argument lists rather than shell strings to mitigate injection risks, this functionality provides the skill with extensive capabilities to run software on the user's system.
  • [EXTERNAL_DOWNLOADS]: The mirror-optimizer sub-agent and its associated script scripts/mirror_optimizer.py are designed to configure external mirror sources for package managers like Docker, NPM, and PyPI. The registries referenced include well-known services provided by organizations such as Aliyun, Tencent, and major Chinese universities.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 11, 2026, 02:08 PM