AGENT LAB: SKILLS
skills/axiomhq/skills/axiom-sre/Gen Agent Trust Hub

axiom-sre

Warn

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • COMMAND_EXECUTION (MEDIUM): The skill employs a centralized configuration reader in 'scripts/config' that outputs shell environment variable assignments, which are subsequently executed via 'eval' in most integration scripts (e.g., 'scripts/axiom-api', 'scripts/slack'). This pattern of dynamic execution based on local configuration files represents a medium risk if the 'config.toml' file is tampered with or contains malicious injections.
  • DATA_EXFILTRATION (LOW): The 'Org Memory' system (via 'scripts/mem-share' and 'scripts/org-add') allows the agent to configure and push knowledge base content to arbitrary Git repositories. This capability could be abused to exfiltrate sensitive incident data or internal facts stored in the memory system to attacker-controlled repositories.
  • PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection as it ingests untrusted data from external platforms without sanitization. Ingestion points: 'scripts/axiom-query' (Axiom logs), 'scripts/slack' (messages), and 'scripts/sentry-api' (Sentry reports). Boundary markers: No specific delimiters or safety instructions separate untrusted content from the agent's instructions. Capability inventory: Includes network access via 'curl', local file writing for memory management, and shell execution. Sanitization: No sanitization or filtering is performed on external data before it is presented to the agent.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 19, 2026, 02:52 AM