printing-press-retro
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill reads local manuscript data, build logs, and generated CLI source code from the user's home directory (
~/printing-press/) and uploads them as zip files tocatbox.moe, a public file-sharing service. Although the skill implements a multi-layer scrubbing process to redact API keys and tokens, the transmission of project files and session metadata to a non-whitelisted external service presents a data exposure risk. - [COMMAND_EXECUTION]: The skill executes a wide range of shell commands and scripts to perform session analysis, artifact packaging, and reporting. This includes the use of
ghfor GitHub issue management,curlfor file uploads, and system utilities likeperl,jq,zip, andpython3for data processing and secret redaction. - [DATA_EXFILTRATION]: The skill uses the GitHub CLI (
gh) to automate the creation of issues and comments on themvanhorn/cli-printing-pressrepository. These issues contain links to the publicly uploaded artifacts, potentially exposing internal project details if the repository or the catbox links are accessed by unauthorized parties. - [COMMAND_EXECUTION]: The skill uses
mktempto create staging directories and performs file operations usingcp,rsync, andfindto prepare artifacts. It includes logic to detect if it is running within the source repository to resolve file paths for work units.
Audit Metadata