NYC

json-yaml-converter

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTION
Full Analysis
  • [Indirect Prompt Injection] (HIGH): The skill possesses a high-risk capability tier due to the combination of processing untrusted external content and having write access to the file system.
  • Ingestion points: scripts/json_yaml_converter.py:load_file (line 46) reads content from user-specified or agent-specified file paths.
  • Boundary markers: Absent. The skill parses raw content into data structures without employing delimiters or instructions to the agent to ignore embedded natural language commands.
  • Capability inventory: scripts/json_yaml_converter.py:save_file (line 64) performs Path.write_text operations, and validate_file (line 103) returns data summaries to the agent context.
  • Sanitization: The script uses yaml.safe_load() (line 55), which is an excellent defense against YAML-based Remote Code Execution (RCE). However, it does not sanitize the resulting data for natural language instructions that could influence the agent's logic.
  • [Metadata Poisoning] (LOW): The source.repository in SKILL.md points to the pyyaml library repository rather than the skill's own source, which is misleading metadata.
  • [Unverifiable Dependencies] (LOW): The script requires pyyaml and toml. While these are trusted, well-known packages, the skill does not specify or pin versions, which is a minor best-practice violation.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 05:05 AM