vm0-computer
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill generates and executes a Node.js proxy script at
/tmp/proxy.mjsto establish a network bridge for local file access. - [EXTERNAL_DOWNLOADS]: The skill uses
npm installto download and install thewslibrary from the public npm registry. - [COMMAND_EXECUTION]: Shell examples in the documentation use command substitution
$(...)with data retrieved from the proxy. This creates a shell injection vulnerability where malicious file names could execute arbitrary commands in the sandbox. - [DATA_EXFILTRATION]: The skill tunnels filesystem data through a remote domain (
webdav.${DOMAIN}), creating a surface for potential data movement from the local machine to an external endpoint. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection when reading local files.
- Ingestion points: Reading file contents via
curlrequests to the local proxy (SKILL.md). - Boundary markers: None identified in the provided code or documentation.
- Capability inventory: Ability to run shell commands, perform network requests, and write to the filesystem.
- Sanitization: No validation or sanitization is performed on file contents before they are processed by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: http://127.0.0.1:8080/ - DO NOT USE without thorough review
Audit Metadata