cli-tools
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/installers/package_manager.shexecutes shell commands retrieved from theversion_commandfield in catalog metadata JSON files usingbash -c. Although it attempts to validate these commands against a whitelist, the whitelist includes powerful interpreters likepython,python3, andruby, enabling arbitrary code execution if the metadata is compromised. - [COMMAND_EXECUTION]: The skill implements a persistence mechanism in
scripts/lib/path_check.shandscripts/check_environment.shby modifying user shell startup files (such as.bashrc,.zshrc, and.profile). It appends PATH exports, environment variable settings, and shell hooks usingeval, ensuring that specified code runs automatically in every future shell session. - [COMMAND_EXECUTION]: Extensive use of
sudois found across multiple scripts, includingscripts/auto_update.sh(for system package upgrades) andscripts/lib/common.sh(for package removal), granting the skill administrative control over the host system. - [EXTERNAL_DOWNLOADS]: Several installer scripts download and execute binaries or scripts from external sources, including GitHub (
github.com), GitLab (gitlab.com), HashiCorp (releases.hashicorp.com), AWS, and Composer (getcomposer.org). While these are well-known developer services, the automated downloading and execution of remote binaries carries inherent security risks. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through project metadata files processed during auditing and tool recommendation workflows.
- Ingestion points: Processes project manifest files such as
package.json,Gemfile, andpyproject.tomlin the working directory viascripts/detect_project_type.sh. - Boundary markers: None implemented for data processed in shell scripts.
- Capability inventory: High-privilege access including
sudo, remote binary execution, and the ability to modify shell RC files. - Sanitization: Validation logic is present in
package_manager.shbut is bypassable due to the inclusion of code interpreters in the execution allowlist.
Recommendations
- AI detected serious security threats
Audit Metadata