subsystem-compile
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/subsystem-compile.ps1contains a path traversal vulnerability.\n - Evidence: The variable
$objNameis sourced directly from thenamefield of the input JSON definition. This variable is used to construct file paths (e.g.,Join-Path $subsDir \"$objName.xml\") and directory paths. A malicious payload in thenamefield (e.g.,../../../backdoor) could allow arbitrary file writes across the file system.\n - Capability: File system write access via
[System.IO.File]::WriteAllTextand directory creation viaNew-Item.\n- [COMMAND_EXECUTION]: Dynamic execution of an external PowerShell script.\n - Evidence: The script
subsystem-compile.ps1executespowershell.exe -NoProfile -File $validateScript. The variable$validateScriptis a computed path targeting a sibling directory (..\\..\\subsystem-validate) and executing its script.\n- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection via unsanitized data ingestion.\n - Ingestion points: Data enters the skill via the
-Valueor-DefinitionFileparameters inscripts/subsystem-compile.ps1.\n - Boundary markers: None are present to distinguish between data and instructions.\n
- Capability inventory: File system write access, directory creation, and command execution.\n
- Sanitization: The script performs XML escaping for the file content but fails to sanitize input used for file system paths and identifiers.
Audit Metadata