initializer-agent
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Category 8: Indirect Prompt Injection] (HIGH): The skill ingests untrusted project specifications (
spec) to generate executable artifacts likeinit.sh. A malicious specification could trick the agent into injecting backdoor commands or malicious dependencies into the project scaffold. * Ingestion points:scripts/initializer.pyandscripts/feature_generator.py(via thespecargument). * Boundary markers: None identified; the agent appears to interpolate user input directly into its reasoning process. * Capability inventory: File system write access, execution ofgitcommands, and generation of shell scripts that execute with user privileges. * Sanitization: No sanitization or validation logic is present to ensure thespecdoes not contain instructional overrides.- [Category 4: Command Execution] (MEDIUM): The skill automates environment setup by generating aninit.shscript that runsnpm install. This involves downloading and executing third-party code from external registries which can be a vector for supply chain attacks.
Recommendations
- AI detected serious security threats
Audit Metadata