playground
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill instructions in
SKILL.mdexplicitly command the agent to runopen <filename>.htmlafter generating code. This executes a dynamically created file in the user's default browser environment. - PROMPT_INJECTION (HIGH): This skill is highly vulnerable to Indirect Prompt Injection (Category 8). It ingests untrusted external data (codebases, git diffs, and documents) and interpolates this data directly into HTML/JS templates.
- Ingestion points:
templates/diff-review.mdprocessesgit showoutput;templates/document-critique.mdprocesses raw document content;templates/data-explorer.mdprocesses database schemas. - Boundary markers: None. There are no delimiters or instructions to treat embedded content as untrusted.
- Capability inventory: The skill generates executable JavaScript and HTML, and uses the
opencommand to launch the result. - Sanitization: Absent. The provided templates use simple regex for formatting (e.g.,
replace(/([^]+)/g, '$1')`) but do not perform HTML entity encoding or script sanitization, making Cross-Site Scripting (XSS) trivial to achieve through malicious input data. - DYNAMIC_EXECUTION (MEDIUM): The skill is a runtime code generator (Category 10) that assembles executable HTML and JavaScript based on templates and user input, which is then immediately executed.
Recommendations
- AI detected serious security threats
Audit Metadata