docs-researcher
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The
docs-researcheragent is highly vulnerable to Indirect Prompt Injection through its web research functionality. - Ingestion points:
WebFetchis used to retrieve data from external URLs identified viaWebSearchinagents/docs-researcher.md. - Boundary markers: None. The fetched content is processed directly by the model to 'Extract information' without any delimiters or instructions to ignore embedded commands.
- Capability inventory: The agent possesses
Writepermissions. Critically, it is instructed to update its ownSKILL.mdfile, providing a path for an attacker to achieve persistence by overwriting the skill's logic. - Sanitization: There is no evidence of sanitization, filtering, or validation of the external content before it is processed by the LLM.
- [COMMAND_EXECUTION] (MEDIUM): The
initcommand inSKILL.mdexecutes a local JavaScript file usingnodevia theBashtool. - Evidence:
node ${CLAUDE_PLUGIN_ROOT}/scripts/init.js .inSKILL.md. - Context: While the included
scripts/init.jscurrently performs standard filesystem operations (creating directories and templates), the pattern of executing arbitrary shell commands based on environment variables is a significant attack surface. - [DATA_EXFILTRATION] (LOW): The agent performs broad scans of the local codebase using
GlobandGrepand has network access viaWebFetch. - Evidence: Step 1 in
agents/docs-researcher.mdsearches the entire project for patterns and helpers, which are then included in documentation files that could be subject to further external interaction.
Recommendations
- AI detected serious security threats
Audit Metadata