idea-factory-v2

Warn

Audited by Gen Agent Trust Hub on May 12, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/idea_factory_v2.py makes extensive use of the subprocess.run module to interact with the host system. It executes gh (GitHub CLI) for repository management and git for version control operations (config, add, commit, push).
  • [REMOTE_CODE_EXECUTION]: The skill attempts to execute an external script located at /Volumes/workspace/search-fallback.sh. This script is not included in the skill package, making its behavior unverifiable and presenting a risk of executing arbitrary code if the file is compromised or points to a malicious script in the target environment.
  • [EXTERNAL_DOWNLOADS]: The skill automates the creation of private repositories on GitHub (gh repo create) and pushes local documentation artifacts to the remote server. While targeted at the author's known account (kjaylee), this represents a data transfer path to an external service.
  • [DATA_EXFILTRATION]: The script reads local files from LOCAL_ARCHIVE_ROOT (/Users/kjaylee/.openclaw/workspace/misskim-skills/intake-log) and potentially exfiltrates processed data by pushing it to a GitHub repository.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 12, 2026, 08:03 AM