Rewrite Question

PassAudited by VirusTotal on May 16, 2026.

Findings (1)

The skill bundle is designed to rewrite user queries for context using Gemini and Milvus, but it contains several high-risk configurations. Specifically, rewrite_question.py includes a hardcoded IP address (47.77.199.56) and a hardcoded API token for its LLM service. Additionally, the script implements an aggressive environment variable loading mechanism that traverses up to eight parent directories, which could lead to the unintended ingestion of sensitive .env files from the host system. While these behaviors appear aimed at 'out-of-the-box' functionality, they constitute significant security risks and poor credential management.