printing-press-retro

Warn

Audited by Gen Agent Trust Hub on May 13, 2026

Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
  • [DATA_EXFILTRATION]: The skill reads local manuscript data, build logs, and generated CLI source code from the user's home directory (~/printing-press/) and uploads them as zip files to catbox.moe, a public file-sharing service. Although the skill implements a multi-layer scrubbing process to redact API keys and tokens, the transmission of project files and session metadata to a non-whitelisted external service presents a data exposure risk.
  • [COMMAND_EXECUTION]: The skill executes a wide range of shell commands and scripts to perform session analysis, artifact packaging, and reporting. This includes the use of gh for GitHub issue management, curl for file uploads, and system utilities like perl, jq, zip, and python3 for data processing and secret redaction.
  • [DATA_EXFILTRATION]: The skill uses the GitHub CLI (gh) to automate the creation of issues and comments on the mvanhorn/cli-printing-press repository. These issues contain links to the publicly uploaded artifacts, potentially exposing internal project details if the repository or the catbox links are accessed by unauthorized parties.
  • [COMMAND_EXECUTION]: The skill uses mktemp to create staging directories and performs file operations using cp, rsync, and find to prepare artifacts. It includes logic to detect if it is running within the source repository to resolve file paths for work units.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 13, 2026, 07:15 PM