qiniu-kodo

Fail

Audited by Gen Agent Trust Hub on Apr 26, 2026

Risk Level: CRITICALCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The scripts/setup.sh script appends plaintext QINIU_ACCESS_KEY and QINIU_SECRET_KEY values to the user's shell configuration files (~/.bashrc or ~/.zshrc) to persist environment variables across sessions.
  • [COMMAND_EXECUTION]: The scripts/setup.sh script attempts to use sudo to move the qshell binary to the system directory /usr/local/bin/. It also uses chmod +x to grant execution permissions to the downloaded tool.
  • [EXTERNAL_DOWNLOADS]: The scripts/setup.sh script downloads the official qshell command-line utility from Qiniu's developer tools domain (devtools.qiniu.com).
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted remote data.
  • Ingestion points: File lists and object metadata are retrieved from the Qiniu KODO API in scripts/qiniu_node.mjs.
  • Boundary markers: Absent; tool outputs containing remote data are interpolated into the agent context without delimiters or instructions to ignore embedded commands.
  • Capability inventory: The skill possesses capabilities for file system writes (downloads), deletions, and network-based file operations.
  • Sanitization: Absent; file keys and names retrieved from storage are used directly as arguments for file system and command operations.
  • [COMMAND_EXECUTION]: The scripts/setup.sh script uses node -e to dynamically evaluate JSON configuration strings for verification during the installation process.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 26, 2026, 11:40 PM