file_reader
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
execute_shell_commandto runfileandtailutilities. Evidence: Commands found inSKILL.md. Risk: If user-supplied filenames are not correctly escaped, it could lead to command injection. - [PROMPT_INJECTION]: The skill reads external content, creating a surface for indirect prompt injection. Ingestion points:
read_fileandtailoperations on files. Boundary markers: No delimiters or warnings are used to sequester file content. Capability inventory: Access to file reading and shell command execution. Sanitization: File content is summarized without prior validation or sanitization.
Audit Metadata