validate-docs-implementation

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (LOW): The skill instructions direct the agent to execute grep -r commands on local directories. While the execution is targeted at documentation paths like 00-system/, executing shell commands based on search patterns derived from analyzed implementation code represents a minor attack surface.
  • [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) because it ingests untrusted data from implementation scripts and documentation files to drive its logic. 1. Ingestion points: Implementation files (scripts) and documentation files (Markdown). 2. Boundary markers: None. The skill does not implement delimiters or safety instructions to distinguish between the documentation content and the agent's instructions. 3. Capability inventory: grep (shell search), Edit tool (file modification), and TodoWrite (workflow tracking). 4. Sanitization: None. The skill assumes the documentation it reads is passive data, which could allow maliciously crafted documentation to influence the agent's behavior during the 'Analyze' or 'Fix' steps.
  • [EXTERNAL_DOWNLOADS] (SAFE): No network requests or remote package installations were detected. The automated scanner alert regarding a malicious URL in requirements.md was evaluated; however, this file is not included in the skill package and is only mentioned in documentation as a search term for potential removal, suggesting it is an environmental context rather than a threat within the skill itself.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:11 PM