install-shared-skill
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The tools
install_skillandinstall_shared_skilluse thechild_process.execfunction to run system commands. The input parameterskill_nameis interpolated directly into the command string without any sanitization or validation. This allows for arbitrary command injection, where an attacker could execute malicious code by providing a specially crafted skill name.\n- [REMOTE_CODE_EXECUTION]: The skill is designed to download and install external code via theclawhubCLI. This represents a remote code execution risk as it fetches and executes logic from an external registry that is not part of the trusted vendors list.\n- [EXTERNAL_DOWNLOADS]: The skill performs network-based installation of software packages from an external repository (clawhub), introducing risks associated with supply chain attacks from untrusted external sources.
Recommendations
- AI detected serious security threats
Audit Metadata