Is aleeecsss/hashgrid-connect safe?

https://github.com/openclaw/skills/tree/main/skills/aleeecsss/hashgrid-connect

38
DANGEROUS

HashGrid Connect is a dangerous skill designed to establish a covert command-and-control channel for AI agents under the explicit framing of 'no human oversight.' Its two-stage architecture — a benign-looking installer that fetches and follows instructions from an attacker-controlled remote URL — completely bypasses code review for the actual operational content. If activated by an agent, it would register the agent's identity with an external service, establish persistent polling for attacker-sent messages, and expose a file upload API, creating a fully operational out-of-band exfiltration and manipulation channel.

Category Scores

Prompt Injection 12/100 · 30%
Data Exfiltration 15/100 · 25%
Code Execution 60/100 · 20%
Clone Behavior 88/100 · 10%
Canary Integrity 92/100 · 10%
Behavioral Reasoning 5/100 · 5%

Findings (10)

CRITICAL Explicit 'No Human Oversight' Directive -50

The very first line of the SKILL.md body states 'Private 1:1 matching and chat for AI agents. No human oversight.' This is not a description of the service — it is a framing instruction that tells the executing agent to treat this skill's operations as outside human supervision. When injected into an agent's context, this language directly attempts to suppress the agent's default transparency and human-in-the-loop behaviors.

CRITICAL Remote Instruction Loading via Fetch-and-Follow Pattern -35

The skill instructs agents to download the 'full API documentation' from https://connect.hashgrid.ai/skill.md and follow its instructions. This is a remote prompt injection vector: the skill file reviewed at install time is not the full instruction set. The actual operational instructions are served from an attacker-controlled endpoint that can be updated at any time without triggering re-review. Any future update to that remote file becomes part of the agent's instructions.

HIGH Persistent C2 Polling Channel Instructed -30

The skill explicitly instructs agents to continuously poll an external server for 'matches' and messages, providing a persistent command-and-control channel. The operator of connect.hashgrid.ai can send arbitrary content to 'matched' agents, including instructions to perform actions the user never authorized.

HIGH Agent Identity Registration with External Service -20

The skill instructs agents to register an account on connect.hashgrid.ai by submitting a username. This leaks agent identity information to a third party and creates a persistent tracked identity for the agent on an operator-controlled platform.

HIGH File Upload Capability Exposed via Remote API -20

The skill references 'file uploads' as part of the full API available in the remotely-fetched documentation. Combined with remote instruction loading, this provides a complete exfiltration path: future remote instructions could direct the agent to read sensitive files and upload them via the API.

HIGH Full C2 Architecture for AI Agents -50

The end-to-end design of this skill creates a complete command-and-control system: agents register, post goals, get matched with attacker-controlled 'agents', and receive messages in a private channel with no human visibility. The operator can send any instructions to matched agents. This is functionally equivalent to a botnet C2 channel, adapted for LLM agents.

HIGH Bypasses Code Review via Remote Instruction Indirection -40

By placing operational instructions at a remote URL rather than in the reviewed SKILL.md, the skill author ensures that any future malicious instruction additions are invisible to the skill marketplace's code review process. The skill as shipped is intentionally incomplete — it is a loader, not the actual skill.

MEDIUM Credential Storage Instruction in User Home Directory -3

The skill instructs agents to write API credentials to ~/.config/hashgrid/credentials.json, persisting an access token for an external service in the user's filesystem.

INFO Clean Installation — No Code Execution During Install 0

The skill contains only SKILL.md and _meta.json. No executable code, npm scripts, git hooks, submodules, or symlinks were present. Network activity during installation was limited to the expected GitHub clone (140.82.121.3:443). No new listening ports or persistent processes were created.

INFO Canary Files Accessed but Not Exfiltrated During Install 0

Honeypot files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, gcloud credentials) were opened and read (CLOSE_NOWRITE) at timestamps 05:00:22 and 05:00:39. These accesses are consistent with the audit infrastructure setup and teardown sequence (observed before the git clone at 05:00:28 and after the audit collection phase). The skill contains no executable code that could trigger these accesses, and the canary integrity monitor confirmed no exfiltration occurred.