adguard-home
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions involve executing administrative system commands with root privileges via SSH.
- Evidence: Use of
sudo systemctl restart AdGuardHomeandsudo journalctl -u AdGuardHomeinSKILL.mdvia SSH connection. - [REMOTE_CODE_EXECUTION]: The skill facilitates the download and execution of binary updates from remote sources.
- Evidence: The command
sudo ./AdGuardHome --updateinSKILL.mdperforms an automated software update at runtime. - [CREDENTIALS_UNSAFE]: The skill requires and handles sensitive credentials in plaintext via environment variables and CLI arguments.
- Evidence: Use of
ADGUARD_USER,ADGUARD_PASS, andADGUARD_SSH_USERenvironment variables inSKILL.md. - [DATA_EXFILTRATION]: The skill provides instructions to access and read sensitive configuration files that may contain secrets or internal network details.
- Evidence: The command
sudo cat /opt/AdGuardHome/AdGuardHome.yamlinSKILL.mdexposes the server's primary configuration file. - [EXTERNAL_DOWNLOADS]: The skill allows the agent to fetch data from arbitrary external URLs.
- Evidence:
python scripts/adguard_api.py add-filter --url "https://example.com/blocklist.txt"inSKILL.md.
Recommendations
- AI detected serious security threats
Audit Metadata