find-test-content
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Command Execution (HIGH): The instruction in
SKILL.mddirects the agent to execute a shell command:node .claude/skills/find-test-content/scripts/find-block-content.js <block-name> [host]. Since there are no sanitization requirements provided to the agent, a malicious user could provide ablock-namecontaining shell metacharacters (e.g.,hero; rm -rf /) to achieve arbitrary command execution in the environment where the agent operates. - Data Exfiltration (MEDIUM): The
scripts/find-block-content.jsfile uses thefetchAPI to retrieve data from a user-providedhostparameter. The script performs no validation or whitelisting of the target host, enabling Server-Side Request Forgery (SSRF). An attacker could use this to scan the local network or access internal services and cloud metadata endpoints (e.g., 169.254.169.254) accessible from the agent's host. - Indirect Prompt Injection (MEDIUM): This category flags the vulnerability surface for external data ingestion.
- Ingestion points:
scripts/find-block-content.jsfetchesquery-index.jsonand multiple HTML pages from the remote host provided as a parameter. - Boundary markers: None. The content is processed directly by the DOM parser without delimiters or instructions to ignore embedded commands.
- Capability inventory: The script performs network requests (
fetch) and DOM parsing (jsdom). Whilejsdomis not configured to execute scripts, the resulting data is returned to the agent's context. - Sanitization: There is no sanitization or filtering of the content retrieved from the remote pages, which could allow an attacker controlling a target site to influence the agent's reasoning process.
Recommendations
- AI detected serious security threats
Audit Metadata