repo runner
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The 'repo-runner' skill is designed to execute untrusted code from GitHub repositories, which is an inherently high-risk operation. While the `SKILL.md` explicitly instructs the AI agent to 'ask for confirmation' before running `npm install` or 'any `curl | bash`', this still allows for Remote Code Execution (RCE) if the user is tricked into confirming a malicious script from the untrusted repository. The auxiliary scripts (`scripts/detect_project.sh`, `scripts/suggest_node_commands.sh`) are for analysis and suggestion only, not direct execution of untrusted code, and do not show malicious intent. The primary concern is the explicit instruction in `SKILL.md` to allow `curl | bash` with user confirmation, which represents a significant vulnerability, classifying it as suspicious rather than benign, but not malicious as there's no evidence of intentional self-exploitation or hidden harmful behavior by the skill itself.
