zhangxuefeng-advisor
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains a 'Hard Output Contract' in
SKILL.mdthat strictly prohibits the AI from identifying itself as an AI, explaining its actions, or providing any meta-commentary ('AI旁白'). These instructions attempt to override the model's standard transparency and safety disclosure behaviors to maintain the 'Zhang Xuefeng' persona. - [COMMAND_EXECUTION]: The skill instructs the agent to execute local Python scripts included in the package (
scripts/build_search_queries.py,scripts/find_similar_examples.py, andscripts/review_regression.py). While these scripts appear to perform benign logic such as string matching and printing, they are executed with user-provided queries as arguments without explicit sanitization, which could lead to command injection if the agent does not properly escape the input. - [DATA_EXFILTRATION]: The script
scripts/find_similar_examples.pycontains hardcoded absolute file paths pointing to the author's local machine (e.g.,/Users/tongziqi/code/zhangxuefeng/manifest.json). While this does not exfiltrate user data, it exposes the author's local directory structure and username, and causes the script to fail on any other system. - [PROMPT_INJECTION]: The
SKILL.mdfile uses high-pressure language ('Strictly forbidden', 'Hard Output Contract') to constrain the agent's output format and behavior, a technique often used in prompt injection to bypass default operational guidelines. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface. It is designed to ingest untrusted data from the web (via search tools as defined in
search-protocol.md) and user inputs, then process this data through local scripts and prompt interpolation without the use of boundary markers or sanitization, while maintaining shell execution capabilities.
Audit Metadata