skills/walterra/agent-tools/es-ingest/Gen Agent Trust Hub

es-ingest

Warn

Audited by Gen Agent Trust Hub on Apr 16, 2026

Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The script scripts/ingest.js implements a transformation feature that dynamically loads and executes JavaScript code from a file path provided via the --transform command-line argument using import() and require(). This mechanism allows for the execution of arbitrary code on the host system if the agent is instructed to use a malicious script.
  • [CREDENTIALS_UNSAFE]: Sensitive Elasticsearch credentials, including API keys and passwords, are accepted as command-line arguments (--api-key, --password, etc.) in scripts/ingest.js. This practice is insecure as command-line arguments are often visible to other users and system monitoring tools via the process list (e.g., using ps or /proc), leading to potential credential exposure.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 16, 2026, 07:43 PM