powershell-7-expert
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The
ps7_wrapper.tsutility constructs shell commands forpwshby concatenating user-provided parameters into an argument array. Whilechild_process.spawnis used, the lack of comprehensive shell-specific escaping for scalar values (strings, booleans) when passed to the PowerShell environment could allow for argument injection. Furthermore, the class allows for a dynamicscriptPathto be provided in the constructor, which facilitates dynamic execution from computed paths, a MEDIUM severity finding.- [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection. \n 1. Ingestion points: External data enters the context via API responses inrest_api_consumer.ps1and via module file parsing inpublish_to_gallery.ps1. \n 2. Boundary markers: Absent. There are no delimiters or specific instructions to the agent to treat this data as untrusted. \n 3. Capability inventory: The skill can execute arbitrary PowerShell commands, make outbound network requests, and write to the file system (via DSC or module publishing). \n 4. Sanitization: Minimal. The wrapper script performs basic JSON escaping for object types but does not sanitize simple string parameters.- [SAFE] (SAFE): Therest_api_consumer.ps1script contains aSkipCertificateCheckparameter. Enabling this flag disables SSL/TLS certificate validation, making the agent vulnerable to man-in-the-middle (MITM) attacks during REST API interactions.- [EXTERNAL_DOWNLOADS] (LOW): Documentation inps7_quickstart.mdprovides instructions for downloading PowerShell installers from GitHub. Since GitHub is a Trusted Source, this download pattern is downgraded to LOW severity.
Audit Metadata