skill-nix-research
Warn
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Unsafe variable interpolation in shell scripts. In Stage 3, the
project_namevariable (sourced fromstate.json) is used directly in a directory path and inside a heredoc block. If the project name contains shell metacharacters or command substitutions (e.g.,$(command)), they may be executed by the shell during file creation. - [COMMAND_EXECUTION]: JQ filter injection. In Stage 2, the
$task_numbervariable is interpolated directly into thejqfilter string using shell concatenation instead of being passed as a safe argument via the--argor--argjsonflags. This allows an attacker who can control the task number to manipulate the logic of the JSON update. - [DATA_EXFILTRATION]: Risk of accidental data exposure via broad git commands. The skill uses
git add -Ain Stage 9, which stages all changes in the current repository. If sensitive files, environment variables, or temporary credentials were created or modified during the session, they would be automatically committed to the git history. - [PROMPT_INJECTION]: Indirect prompt injection surface identified. The skill ingests untrusted data from
specs/state.json(such asdescriptionandproject_name) and a user-providedfocus_prompt, which are then passed to a subagent via theTasktool without sanitization. - Ingestion points:
specs/state.json(metadata fields) and thefocus_promptinput. - Boundary markers: None present; data is passed directly into the tool prompt.
- Capability inventory: The skill and its subagent have access to
Bash,Edit,Write, andTasktools. - Sanitization: No validation or escaping is performed on external content before interpolation.
Audit Metadata