hive-create-task
Fail
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically generates and executes shell scripts (
prepare.shandeval/eval.sh) during the 'Test & Iterate' phase (Phase 5). This behavior allows for arbitrary command execution on the host system if the generated script content is influenced by malicious user input or untrusted data. - [REMOTE_CODE_EXECUTION]: The documentation and troubleshooting sections suggest that
prepare.shis intended to download external data or dependencies (e.g., viacurlorwget). The execution of these scripts in Phase 5.1 (bash prepare.sh) constitutes a remote code execution risk, especially since the skill does not verify the integrity or source of the downloaded content. - [CREDENTIALS_UNSAFE]: In Phase 6.3b, the skill requests an administrative key (
HIVE_ADMIN_KEY) from the user and subsequently passes it as a plaintext command-line argument (--admin-key <key>) to thehiveCLI tool. This is a dangerous pattern for credential management as it can expose secrets in process lists, shell history, and system logs. - [PROMPT_INJECTION]: The skill functions as a factory for agent instructions, taking user input to populate the
program.mdtemplate. This creates an Indirect Prompt Injection surface where malicious instructions can be embedded in the task definition to override the behavior of downstream agents that ingest the generated repo.
Recommendations
- AI detected serious security threats
Audit Metadata