skills/olunuga/ralph-loop/ralph/Gen Agent Trust Hub

ralph

Fail

Audited by Gen Agent Trust Hub on May 10, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
  • [PROMPT_INJECTION]: The user-supplied '$ref' argument is directly interpolated into multiple shell commands (e.g., 'git show', 'find', 'git worktree') without any sanitization or validation. This allows an attacker to execute arbitrary commands by providing a malicious branch name or identifier.\n- [COMMAND_EXECUTION]: The skill instructions explicitly require the 'dangerouslyDisableSandbox: true' flag for 'git worktree' operations. This flag disables platform-level security boundaries, granting the skill unauthorized write access to the filesystem.\n- [COMMAND_EXECUTION]: The variable '$SPEC_TITLE' is parsed from the first line of an external spec file and used as an argument in a shell script execution ('bash ralph/loop.sh plan-work "$SPEC_TITLE" 3'). If the spec title contains shell metacharacters, it can lead to command injection.\n- [REMOTE_CODE_EXECUTION]: The skill executes 'ralph/loop.sh', a script that resides in the repository. Because the skill checkouts a branch controlled by the user-provided '$ref', an attacker can use a malicious branch to provide a modified script, resulting in the execution of untrusted code.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
May 10, 2026, 08:50 PM