unraid
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Shell command injection vulnerability in
scripts/unraid-query.sh. The variables$QUERY,$URL, and$API_KEYare interpolated into a double-quoted string within acurlcommand inside a subshell. This allows the execution of arbitrary shell commands through shell expansion (e.g., using$(command)or backticks) if the input contains shell meta-characters.\n- [COMMAND_EXECUTION]: The scriptexamples/read-logs.shis vulnerable to command injection as it takes user-provided arguments and interpolates them directly into a query string that is subsequently passed to the vulnerableunraid-query.shscript.\n- [CREDENTIALS_UNSAFE]: Thecurlcommand inscripts/unraid-query.shuses the-k(or--insecure) flag, which disables SSL/TLS certificate verification. This exposes the Unraid API key and server data to interception via man-in-the-middle (MITM) attacks.\n- [DATA_EXFILTRATION]: Thescripts/dashboard.shscript reads sensitive server configuration and credentials from$HOME/.clawdbot/credentials/unraid/config.jsonand writes detailed system inventories to$HOME/clawd/memory/bank/unraid-inventory.md, posing a risk of unauthorized credential exposure and data collection.\n- [PROMPT_INJECTION]: Vulnerability to indirect prompt injection inexamples/read-logs.sh. 1. Ingestion points: User-provided arguments$LOG_NAMEand$LINESinexamples/read-logs.sh. 2. Boundary markers: Absent. 3. Capability inventory: Shell subprocess execution and network requests viacurlinscripts/unraid-query.sh. 4. Sanitization: Absent; input is directly interpolated into a shell-executed query string.
Recommendations
- AI detected serious security threats
Audit Metadata