mini-six-ren
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The
scripts/interpret.pyfile contains an arbitrary file read vulnerability in theload_predictionfunction. By prefixing the--predictionargument with an@character, the script will read the contents of any file on the local file system. This content is then sent to the configured external LLM provider as part of the prompt, leading to potential data exfiltration of sensitive files like~/.ssh/id_rsaor.env. - [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). The
questionprovided by the user is interpolated directly into the LLM system prompt inscripts/interpret.pywithout any sanitization or robust boundary markers. A malicious question could override the divination master persona to extract system prompts or perform other unauthorized actions. - [COMMAND_EXECUTION] (MEDIUM): The workflow relies on executing local Python scripts via
uv run. While these are part of the skill, the dependency on a local environment that can read arbitrary files (as noted above) increases the risk if the agent is manipulated into executing these scripts with malicious arguments. - [EXTERNAL_DOWNLOADS] (LOW): The scripts use
uv runwhich dynamically manages and downloads Python dependencies (pydantic-ai-slim,python-dotenv,pyyaml). While these are common packages, the runtime fetching of dependencies is a minor risk factor.
Recommendations
- AI detected serious security threats
Audit Metadata