json-yaml-converter
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill possesses a high-risk capability tier due to the combination of processing untrusted external content and having write access to the file system.
- Ingestion points:
scripts/json_yaml_converter.py:load_file(line 46) reads content from user-specified or agent-specified file paths. - Boundary markers: Absent. The skill parses raw content into data structures without employing delimiters or instructions to the agent to ignore embedded natural language commands.
- Capability inventory:
scripts/json_yaml_converter.py:save_file(line 64) performsPath.write_textoperations, andvalidate_file(line 103) returns data summaries to the agent context. - Sanitization: The script uses
yaml.safe_load()(line 55), which is an excellent defense against YAML-based Remote Code Execution (RCE). However, it does not sanitize the resulting data for natural language instructions that could influence the agent's logic. - [Metadata Poisoning] (LOW): The
source.repositoryinSKILL.mdpoints to thepyyamllibrary repository rather than the skill's own source, which is misleading metadata. - [Unverifiable Dependencies] (LOW): The script requires
pyyamlandtoml. While these are trusted, well-known packages, the skill does not specify or pin versions, which is a minor best-practice violation.
Recommendations
- AI detected serious security threats
Audit Metadata