aeo-visibility
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: Unsanitized user input is used for file system operations.
- The
clientNameparameter provided via the CLI is used directly inpath.join(insrc/cli.js) to construct directory and file paths. - This lack of validation allows for potential path traversal attacks where a malicious
clientName(e.g.,../../) could cause the skill to read from or write to locations outside the intended workspace directory. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its analysis architecture.
- Ingestion points: The skill fetches responses from external AI engines (ChatGPT, Claude, Gemini, Perplexity) in
src/engines.jsand passes them tosrc/analyzer.js. - Boundary markers: The analysis prompt in
src/analyzer.jsinterpolates the untrusted response directly (Response: ${response}) without using delimiters or instructions to treat the content strictly as data. - Capability inventory: The skill has permissions to write files to the disk and perform network operations via multiple AI provider APIs.
- Sanitization: No sanitization or filtering is applied to the content returned by external engines before it is injected into the analysis prompt.
- [CREDENTIALS_UNSAFE]: The skill manages multiple sensitive API keys and attempts to access environment files outside its own directory scope.
- In
src/cli.js, the script attempts to load a.envfile from the workspace root using a relative path that navigates four levels up (../../../../.env). While intended for ease of use, this pattern accesses sensitive files at a higher directory level than necessary for the individual skill.
Audit Metadata