autoresearch
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill programmatically modifies a local training script and executes it using subprocess commands (e.g.,
uv run train.py). It also utilizes shell commands for version control viagitand log analysis throughgrepandawk. This dynamic execution of agent-generated code is a high-risk pattern that can be exploited to execute arbitrary logic if the modification process is subverted.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it incorporates external codebase content into its reasoning loop. * Ingestion points: The agent reads the full content oftrain.py,prepare.py, andREADME.md(Phase 1.3 and Phase 2.1). * Boundary markers: No delimiters or specific instructions are provided to the agent to distinguish codebase content from its own system instructions. * Capability inventory: The agent has the ability to write to the filesystem and execute system commands (uv run,git). * Sanitization: The skill does not perform any validation, filtering, or escaping of comments or code from the ingested files before processing them.
Audit Metadata