ima-agent-skill
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
SKILL.mdfile defines theima_searchtool using a shell command string that interpolates the{query}parameter inside double quotes:/usr/bin/python3 .../ima.py "{query}". An attacker can break out of the quotes by providing a query such as"; <malicious_command>; #", leading to arbitrary command execution on the host system. - [DATA_EXFILTRATION]: The script
scripts/ima.pyis designed to read a local configuration file (config.jsonor~/.clawd_ima_config.json) to retrieve aknowledge_id. This exposes local configuration data to the agent context. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It performs searches on
ima.qq.comand extracts the full DOM text usingRuntime.evaluate. Malicious instructions embedded in search results or the target website could be ingested by the agent. The skill lacks boundary markers or sanitization for the extracted content. - [EXTERNAL_DOWNLOADS]: The skill makes local network requests to
http://127.0.0.1:8315/json/versionandhttp://127.0.0.1:8315/json/newto manage the IMA application. While targeted at localhost, this interaction with the Chrome DevTools Protocol allows for controlling the browser instance and executing arbitrary JavaScript viaRuntime.evaluate.
Recommendations
- HIGH: Downloads and executes remote code from: http://{host}:{port}/json/version - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata