skill-builder
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill encourages the installation of the
skill-seekersdependency using acurl | pythonpattern (python3 -c "$(curl -fsSL ...)"). This method executes remote code directly from a third-party GitHub repository without verification, representing a high-risk execution vector. This is documented inreferences/setup.mdandscripts/setup_skill_seekers.sh. - [COMMAND_EXECUTION]: The skill includes a utility script (
scripts/enhance-workaround.sh) that executes theclaudeCLI using the--dangerously-skip-permissionsflag. This action explicitly bypasses built-in security guardrails and grants the agent unrestricted tool access during the enhancement process. - [REMOTE_CODE_EXECUTION]: The
scripts/enhance-workaround.shscript dynamically generates a Python script at runtime and executes it via the interpreter to interface with local APIs. This runtime code generation increases the risk of injection and execution of unauthorized logic. - [EXTERNAL_DOWNLOADS]: The skill performs automated downloads from external domains, including GitHub and
skillseekersweb.com, to fetch configurations and source code. These resources originate from a third-party repository (yusufkaraaslan/Skill_Seekers) that is not recognized as a trusted source, requiring manual verification of the downloaded content. - [PROMPT_INJECTION]: The skill presents a significant surface for indirect prompt injection as it ingests untrusted content from documentation websites, code repositories, and PDFs. It lacks explicit boundary markers or sanitization logic to prevent malicious instructions within these sources from influencing the agent's behavior.
- Ingestion points: Website scraping, GitHub analysis, and PDF extraction defined in
SKILL.mdandreferences/advanced-workflows.md. - Boundary markers: Absent in ingestion logic.
- Capability inventory: Extensive use of
bash,write,git,pip, andnpxacross several scripts. - Sanitization: No evidence of content escaping or validation before processing.
Recommendations
- AI detected serious security threats
Audit Metadata