service-registry
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates the execution of external applications via the Python
subprocessmodule. - Evidence: The
execute_safelyfunction inmodules/execution-patterns.mdusessubprocess.runto launch command strings constructed from service configurations. - [PROMPT_INJECTION]: The skill's command construction logic is vulnerable to indirect prompt injection by embedding untrusted user data into command templates.
- Ingestion points: The
promptandfilesarguments are consumed by thebuild_commandfunction inmodules/execution-patterns.md. - Boundary markers: Not utilized; input is directly interpolated into strings such as
"{command} -p {prompt}". - Capability inventory: High-risk capability identified: arbitrary command execution on the host system.
- Sanitization: The skill uses
shlex.splitwhich mitigates shell-level character escaping issues but does not sanitize the content to prevent it from being interpreted as malicious flags or parameters by the target CLI tools.
Audit Metadata