form-remove
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local PowerShell script (
remove-form.ps1) to perform file system operations. Parameters provided by the user are passed directly to the script execution command. - [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection and path traversal due to the lack of input sanitization on file-system-bound parameters.
- Ingestion points: The
ObjectName,FormName, andSrcDirarguments inSKILL.mdare taken from user input. - Boundary markers: None; there are no protective delimiters or warnings to the agent regarding the handling of these inputs.
- Capability inventory: The script
scripts/remove-form.ps1has the capability to delete files and directories (Remove-Item) and modify existing XML files (XmlDocument.Save). - Sanitization: Absent; the script uses
Join-Pathbut does not verify that the resulting path is restricted to the intended project directory, which could allow an attacker to target arbitrary system files if they can influence the parameters.
Audit Metadata