exploring-data
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/analyze.shis vulnerable to code injection because it interpolates the shell variable$DATAFILEdirectly into a Python heredoc usingfilepath = Path("$DATAFILE"). A malicious filename containing escape characters could allow for arbitrary Python code execution. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. Findings: 1. Ingestion point: Untrusted data files in
analyze.sh. 2. Boundary markers: Absent in the output ofsummarize_insights.py. 3. Capability inventory: Shell and Python execution inanalyze.sh. 4. Sanitization: Absent; the scriptsummarize_insights.pyextracts raw data patterns and presents them directly to the agent. - [EXTERNAL_DOWNLOADS]: The
scripts/install_ydata.shscript installs theydata-profilinglibrary from the Python Package Index (PyPI). This is a well-known service and the installation is a standard requirement for the skill's operation.
Recommendations
- AI detected serious security threats
Audit Metadata