skills/atovk/skillx/component-builder/Gen Agent Trust Hub

component-builder

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface for indirect prompt injection.
    • Ingestion points: Untrusted data enters the agent context via the '组件描述' (Component Description) and 'props' fields provided by the user.
    • Boundary markers: None. There are no delimiters or specific instructions to the agent to disregard embedded instructions within the user's description.
    • Capability inventory: The skill has access to the Write and Read tools, which allow for file system modification and inspection.
    • Sanitization: There is no evidence of sanitization or validation of the input to ensure it only describes UI components and does not contain escape sequences or system commands.
    • Impact: An attacker could provide a description like "A component that also writes 'ssh-rsa ...' to ~/.ssh/authorized_keys" to gain persistent access to the host.
  • Privilege Escalation (MEDIUM): While not explicitly using sudo, the Write tool is provided without path restrictions in the prompt. If the agent is redirected by an injection, it can write to any location accessible by the process, potentially modifying shell profiles or sensitive configurations.
  • Data Exposure (LOW): The Read tool, if combined with a prompt injection attack, could be used to exfiltrate sensitive files (e.g., .env or credentials) if the agent is tricked into reading them and displaying the content or writing it to a public directory.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:24 PM