docs-search
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill facilitates the ingestion of external content from aem.live, which poses a significant risk if the source content is compromised or contains adversarial instructions.
- Ingestion points:
scripts/search.jsfetches JSON indexes from aem.live, andSKILL.md(Step 4) explicitly instructs the agent to fetch and read full HTML content from the same domain. - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands within the fetched documentation.
- Capability inventory: The agent, which uses this skill, typically possesses high-privilege capabilities such as file modification and command execution.
- Sanitization: None. The agent is encouraged to follow 'technical guidance' and 'examples' found in the external docs, creating a direct path for an attacker to influence the agent's actions.
- [Dynamic Execution] (MEDIUM): The
scripts/search.jsfile uses user-provided keywords (via the agent) to construct regular expressions without sanitization. - Evidence:
const regex = new RegExp(keyword, 'gi');inscripts/search.jsallows for Regular Expression Denial of Service (ReDoS) attacks if an attacker provides a 'poisoned' keyword that causes exponential backtracking. - [Data Exposure & Exfiltration] (LOW): The skill performs network operations to a non-whitelisted domain.
- Evidence:
https.getis used to fetchdocpages-index.jsonandquery-index.jsonfromwww.aem.live. While legitimate for the skill's purpose, the domain is not within the defined trusted scope.
Recommendations
- AI detected serious security threats
Audit Metadata