subsystem-edit
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
subsystem-edit.ps1executes an external validation script usingpowershell.exe. The path to this validator is computed dynamically relative to the skill's location (..\..\subsystem-validate\scripts\subsystem-validate.ps1), which creates a dependency on the presence and integrity of code outside the skill's own package. - [PROMPT_INJECTION]: The skill is vulnerable to XML injection in the
Do-AddContentfunction. The$itemvalue, which originates from user-provided input, is directly interpolated into an XML string fragment (<xr:Item ...>$item</xr:Item>) without escaping or validation. This allows an attacker to inject arbitrary XML tags, comments, or attributes into the target 1C configuration file. - [PROMPT_INJECTION]: Indirect Prompt Injection Surface: 1. Ingestion points: The skill reads and processes 1C subsystem XML files and JSON-formatted operation definitions (
DefinitionFile). 2. Boundary markers: No specific boundary markers or instructions are used to separate structure from potentially untrusted content within the processed files. 3. Capability inventory: The skill possesses the ability to read and write to the filesystem and execute sub-processes via PowerShell. 4. Sanitization: Sanitization is applied inconsistently; while synonyms and explanations useSecurityElement::Escape, the content addition logic does not, leaving an exploitable gap for XML injection.
Audit Metadata