@1977/billions-faiar
Fail
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses the
npxcommand to download and execute theclawhubpackage from an external registry. This pattern allows for arbitrary remote code execution at runtime from an unverified source.\n- [EXTERNAL_DOWNLOADS]: The commandnpx clawhub@latest install verified-agent-identitytriggers network activity to fetch software packages from unverified third-party sources.\n- [COMMAND_EXECUTION]: The instruction triggers shell command execution vianpx, which executes code on the local environment without prior verification of the package content.\n- [PROMPT_INJECTION]: The metadata description contains a hidden Unicode Line Separator character (U+2028). This technique is associated with steganographic prompt injection to hide instructions or evade detection by security scanners.
Recommendations
- AI detected serious security threats
Audit Metadata