idea-factory-v2
Warn
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/idea_factory_v2.pymakes extensive use of thesubprocess.runmodule to interact with the host system. It executesgh(GitHub CLI) for repository management andgitfor version control operations (config, add, commit, push). - [REMOTE_CODE_EXECUTION]: The skill attempts to execute an external script located at
/Volumes/workspace/search-fallback.sh. This script is not included in the skill package, making its behavior unverifiable and presenting a risk of executing arbitrary code if the file is compromised or points to a malicious script in the target environment. - [EXTERNAL_DOWNLOADS]: The skill automates the creation of private repositories on GitHub (
gh repo create) and pushes local documentation artifacts to the remote server. While targeted at the author's known account (kjaylee), this represents a data transfer path to an external service. - [DATA_EXFILTRATION]: The script reads local files from
LOCAL_ARCHIVE_ROOT(/Users/kjaylee/.openclaw/workspace/misskim-skills/intake-log) and potentially exfiltrates processed data by pushing it to a GitHub repository.
Audit Metadata