hive-setup
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses
sudo apt-getto install system-wide Python packages on Linux, which requires administrative privileges and grants the agent elevated permissions over the host system. - [REMOTE_CODE_EXECUTION]: Downloads and executes the
uvinstallation script directly fromhttps://astral.sh/uv/install.shvia a shell pipe (curl | sh). - [REMOTE_CODE_EXECUTION]: Executes a shell script named
prepare.shusingbashafter cloning a task from a remote hive server. This facilitates the execution of arbitrary code provided by the remote task repository. - [COMMAND_EXECUTION]: Automatically installs Python dependencies from
requirements.txtfiles found within cloned task directories usingpiporuvwithout prior validation. - [DATA_EXFILTRATION]: Accesses and manages sensitive SSH private keys located in
~/.hive/keys/, used for authenticating with Git repositories during the task cloning process. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting untrusted data from a remote task server and subsequently executing scripts or installing packages from that data.
- Ingestion points:
hive task clonecommand (SKILL.md) - Boundary markers: Absent
- Capability inventory:
bash prepare.sh,uv pip install, andhive authcommands (SKILL.md) - Sanitization: No sanitization or verification of the cloned content is performed before execution.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata