A nach B - AT Public Transport Service (VOR)

PassAudited by VirusTotal on May 13, 2026.

Findings (1)

The skill is classified as suspicious due to a JSON injection vulnerability present in all shell scripts (`departures.sh`, `disruptions.sh`, `route.sh`, `search.sh`). User-provided arguments are directly embedded into the JSON payload without proper escaping, allowing a malicious user to inject arbitrary JSON fragments into the API request. While this does not lead to arbitrary shell command execution on the agent's host, it could enable malformed API requests to the `https://vao.demo.hafas.de/gate` endpoint, potentially causing unexpected behavior or errors on the API side. No other malicious indicators such as data exfiltration, persistence, or prompt injection against the agent were found.