qwencloud-text
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/gossamer.pyutilizessubprocess.runto execute a Python script (check_update.py) found in a sibling skill's directory. The target script path is resolved at runtime by searching through the project's skill installation directories, which constitutes dynamic code execution from computed paths. - [EXTERNAL_DOWNLOADS]: The skill's update logic (found in
SKILL.mdandscripts/gossamer.py) facilitates the installation of theqwencloud-update-checkutility via thenpx skills addcommand. This mechanism downloads and executes code from theQwenCloud/qwencloud-airepository. - [DATA_EXFILTRATION]: The library
scripts/qwencloud_lib.pyincludes aresolve_filefunction that can read local files and either convert them to base64 strings or upload them to thedashscope-intl.aliyuncs.comendpoint. While intended for multimodal processing, this creates a potential vector for local data to be sent to external infrastructure if sensitive file paths are passed to the tool.
Audit Metadata