using-cloud-cli
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The instruction
cat ~/.aws/credentialsinSKILL.mdexplicitly commands the agent to read highly sensitive, plain-text credential files into its context. This pattern is identified as a high-severity exposure risk. - Indirect Prompt Injection (HIGH): The skill possesses a high-risk vulnerability surface due to its combined capabilities and lack of defensive measures.
- Ingestion points: The skill utilizes the
Readtool, which allows it to ingest untrusted content from the filesystem. - Boundary markers: There are no delimiters or instructions to ignore embedded commands within processed data.
- Capability inventory: The skill has access to the
Bashtool, allowing for arbitrary subprocess execution, and theReadtool for file access. It also includes destructive cloud commands likegcloud ... delete. - Sanitization: There is no evidence of input validation or escaping before passing data to shell commands.
- Metadata Poisoning (MEDIUM): The description suggests use for 'making decisions about cloud services,' which, when paired with the
Bashtool and lack of input sanitization, increases the risk that malicious instructions in cloud resource metadata could trick the agent into performing unauthorized operations.
Recommendations
- AI detected serious security threats
Audit Metadata