ask
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions define shell command templates that incorporate user-provided input through the
{{ARGUMENTS}}placeholder. - [COMMAND_EXECUTION]: The use of
{{ARGUMENTS}}inside double quotes in commands such asclaude -p "{{ARGUMENTS}}"andomx ask gemini "{{ARGUMENTS}}"is susceptible to command injection. An attacker providing input with shell metacharacters (e.g.,;,`,$(...)) could execute arbitrary commands on the host system with the privileges of the agent process. - [COMMAND_EXECUTION]: There is no evidence of input validation, escaping, or sanitization before the user-provided data is interpolated into the shell command strings.
Recommendations
- AI detected serious security threats
Audit Metadata