qiniu-kodo
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: CRITICALCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
scripts/setup.shscript appends plaintextQINIU_ACCESS_KEYandQINIU_SECRET_KEYvalues to the user's shell configuration files (~/.bashrcor~/.zshrc) to persist environment variables across sessions. - [COMMAND_EXECUTION]: The
scripts/setup.shscript attempts to usesudoto move theqshellbinary to the system directory/usr/local/bin/. It also useschmod +xto grant execution permissions to the downloaded tool. - [EXTERNAL_DOWNLOADS]: The
scripts/setup.shscript downloads the officialqshellcommand-line utility from Qiniu's developer tools domain (devtools.qiniu.com). - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted remote data.
- Ingestion points: File lists and object metadata are retrieved from the Qiniu KODO API in
scripts/qiniu_node.mjs. - Boundary markers: Absent; tool outputs containing remote data are interpolated into the agent context without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill possesses capabilities for file system writes (downloads), deletions, and network-based file operations.
- Sanitization: Absent; file keys and names retrieved from storage are used directly as arguments for file system and command operations.
- [COMMAND_EXECUTION]: The
scripts/setup.shscript usesnode -eto dynamically evaluate JSON configuration strings for verification during the installation process.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata