security-auditor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill requests and uses the
Bashtool, which enables the execution of arbitrary system commands. While the intended use cases are fornpm auditandpip-audit, the lack of constraints on this tool represents a high risk if the agent's logic is manipulated. - [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8) because it is designed to ingest and reason over untrusted data with high-privilege tools.
- Ingestion points: Reads and scans arbitrary code files, configuration files, and dependency manifests (e.g.,
SKILL.mdactivation triggers). - Boundary markers: Absent. The skill provides no instructions to the agent on how to distinguish its core logic from the content of the files it is auditing.
- Capability inventory: Possesses
Read,Grep, andBashcapabilities, allowing it to read sensitive files and execute commands based on interpreted data. - Sanitization: None. There is no evidence of sanitization or validation of the input data before it is processed by the agent or passed to tools.
- [EXTERNAL_DOWNLOADS] (LOW): The skill references the use of
pip-auditandnpm audit. While these are standard security tools, they involve interacting with external package registries (pypi.org,registry.npmjs.org), which is noted as a dependency on external sources.
Recommendations
- AI detected serious security threats
Audit Metadata