here-now
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
scripts/publish.shscript suggests the commandcurl -fsSL https://here.now/install.sh | bashas a fallback for installing thejqdependency. Piping unverified remote scripts directly into a shell session is a critical security risk that can lead to complete system compromise. - [DATA_EXFILTRATION]: The core functionality of the skill is to read local files and directories and upload them to external servers at
here.now. While this is the stated purpose, it facilitates the movement of potentially sensitive local data to a third-party service. - [COMMAND_EXECUTION]: The script
scripts/publish.shexecutes several system-level commands, includingcurl,find,file, andjq, to collect and transmit local information. - [CREDENTIALS_UNSAFE]: The skill stores and retrieves API keys from
~/.herenow/credentials. Although it sets restricted file permissions (chmod 600), the practice of storing long-lived credentials in a predictable plain-text location within the home directory poses a security risk. - [EXTERNAL_DOWNLOADS]: The skill relies on external package installation via
npxand promotes the download of installation scripts from an external domain. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface (Category 8). 1. Ingestion points: Untrusted local files provided via the
TARGETargument inscripts/publish.sh. 2. Boundary markers: Absent. 3. Capability inventory: Significant system and network access viacurland shell execution. 4. Sanitization: Absent. Malicious instructions within published files could be executed or processed if the resulting URLs are subsequently accessed by an agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://here.now/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata