agentscope-skill
Fail
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/view_pypi_latest_version.shretrieves metadata from the official PyPI registry and pipes the response directly to a Python interpreter to parse the version string. - [EXTERNAL_DOWNLOADS]: The skill instructions in
SKILL.mddirect the agent to perform agit cloneof theagentscope-ai/agentscoperepository from GitHub into the local environment to facilitate exploration of documentation and code examples. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) because it is designed to ingest and process data from an external repository while possessing code execution capabilities.
- Ingestion points: Content from the repository cloned from
github.com/agentscope-ai/agentscope(Step 1 inSKILL.md). - Boundary markers: Absent; the instructions do not specify the use of delimiters or warnings when the agent reads the cloned repository files.
- Capability inventory: The skill provides and documents tools for
execute_shell_commandandexecute_python_code(examples inSKILL.mdandreferences/multi_agent_orchestration.md). - Sanitization: None; the agent is encouraged to read and adapt examples from the external repository directly.
- [COMMAND_EXECUTION]: The skill includes a Python script
scripts/view_module_signature.pythat utilizes theinspectmodule to dynamically examine the structure and signatures of theagentscopelibrary at runtime.
Recommendations
- HIGH: Downloads and executes remote code from: https://pypi.org/pypi/agentscope/json - DO NOT USE without thorough review
Audit Metadata