task-coordination
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions and scripts execute several high-privilege shell commands, including
mc mirror,mkdir -p, andrm -f, which target paths within the/root/hiclaw-fs/directory. - [REMOTE_CODE_EXECUTION]: The
task_idvariable is susceptible to command injection and path traversal. It is interpolated directly into shell commands inSKILL.mdand used as a path component in scripts without sanitization or escaping. A malicioustask_idcontaining shell metacharacters (e.g.,;,|,$(...)) or traversal sequences (e.g.,../) could allow an attacker to execute arbitrary code or manipulate files outside the intended directory. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted input (
task_id) and uses it in critical operations without safety markers. - Ingestion points: The
task_idparameter provided to shell scripts and synchronization commands. - Boundary markers: None present in the documentation or scripts.
- Capability inventory: File system modification (write, delete, create) and network data synchronization via
mc mirror. - Sanitization: There is no evidence of input validation, escaping, or path normalization for the
task_idvariable.
Audit Metadata