service-registry
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides an infrastructure for executing external CLI tools such as Gemini and Qwen using
subprocess.runwithin theexecute_safelyfunction inmodules/execution-patterns.md.- [REMOTE_CODE_EXECUTION]: Inmodules/execution-patterns.md, thebuild_commandfunction constructs shell commands by interpolating variables includingpromptandfilesinto string templates. This dynamic assembly of executable content is vulnerable to command injection if input values are not strictly validated before being passed to the shell environment.- [DATA_EXFILTRATION]: The configuration schema defined inmodules/service-config.mdexplicitly manages sensitive credentials likeGEMINI_API_KEYandQWEN_API_KEYvia environment variables. The presence of a command execution engine that accepts user-controlled strings provides a vector for an attacker to read and exfiltrate these secrets.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface where malicious data could influence system-level actions. - Ingestion points: Untrusted data enters the system through the
promptandfilesparameters in theexecuteandbuild_commandfunctions. - Boundary markers: The provided command templates lack explicit delimiters or instructions to isolate user input from the command structure.
- Capability inventory: The skill maintains the capability to execute shell commands via
subprocess.runthrough the registry. - Sanitization: While the code uses
shlex.splitto tokenize command strings, it lacks high-level validation or sanitization of inputs before they are interpolated into the executable template.
Audit Metadata