x-mirror
Fail
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation guide in
data/install.mdincludes a command that downloads a shell script fromhttps://get.x-cmd.comand pipes it directly into the shell interpreter (curl -fsSL https://get.x-cmd.com | sh). This method is high-risk as it executes remote code without prior local inspection. - [EXTERNAL_DOWNLOADS]: The skill fetches scripts, binary packages, and configuration files from external sources, including
https://get.x-cmd.com,https://github.com/x-cmd/release, andhttps://conda.prefix.dev. - [COMMAND_EXECUTION]: The skill operates by executing shell commands to modify package manager registries and system environment settings. It also includes instructions for persistent modification of shell profile files (e.g.,
~/.bashrc,~/.zshrc) to automatically load the x-cmd environment. - [PROMPT_INJECTION]: The skill demonstrates a vulnerability surface for indirect prompt injection. It ingests untrusted user input (mirror names, package manager targets) and interpolates them into shell commands (
x mirror <pkgmgr> set <mirror-name>) without explicit evidence of sanitization or validation in the provided skill content.
Recommendations
- AI detected serious security threats
Audit Metadata