discord-bot-architect

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • Dynamic Execution (MEDIUM): The JavaScript and Python templates utilize dynamic loading via require() and bot.load_extension() for files discovered through directory scanning (fs.readdirSync, os.listdir). While a standard pattern in Discord bot development, this involves executing code from computed filesystem paths.\n- Indirect Prompt Injection (LOW): The bot templates establish ingestion points for untrusted data from Discord users (e.g., the greet command message). Evidence: 1. Ingestion points: interaction, ctx, and message parameters. 2. Boundary markers: Absent in prompt construction. 3. Capability inventory: interaction.reply, ctx.respond, and bot.load_extension. 4. Sanitization: No sanitization of user-provided strings before processing or display.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 01:08 PM