Dynamic code execution
Critical
- Finding
- Dynamic code execution detected.
Security checks across static analysis, malware telemetry, and agentic risk
The workspace artifact files could not be read due to an execution sandbox failure, so no evidence-backed suspicious behavior was identified.
Do not treat this as a completed approval review; rerun the scan in an environment where metadata.json and artifact/ can be read.
Our install.sh unzips engine files to the workspace directory, registers 3 cron tasks (engine init at 5am, health check at 0am, memory maintenance at 23pm), and verifies Python module imports. These are all standard installation procedures for a runtime engine package — no malicious behavior. The bundle zip contains only Crusheart Agent OS engine code (.py files) and system rule files (.md). 此技能包已不在维护与更新,需要体验新版本请到插件分类中搜索AutoBrain
VirusTotal findings are pending for this skill version.
No visible risk-analysis findings were reported for this release.