skill-team-research
Warn
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Unsafe shell interpolation in
jqfilters. In Stage 2 and Stage 10, the variable$task_numberis interpolated directly into thejqfilter string using single quotes (e.g.,'(.active_projects[] | select(.project_number == '$task_number'))'). While Stage 1 attempts validation, the use of shell interpolation instead ofjq's--argjsonutility creates a logic injection risk where a crafted task number could manipulate the JSON transformation. - [PROMPT_INJECTION]: Indirect prompt injection surface. The skill interpolates untrusted data from the
description(retrieved fromstate.json) and the user-suppliedfocus_promptdirectly into the prompts generated for teammate agents in Stage 5. - Ingestion points:
descriptionfield fromspecs/state.jsonandfocus_promptinput parameter. - Boundary markers: Absent. The data is interpolated directly (e.g.,
Research task {task_number}: {description}) without delimiters or instructions to ignore embedded commands. - Capability inventory: The skill uses
Bash,Edit,Write, andRead. Spawned teammates have access toWebSearch,WebFetch,Read,Grep, andGlobtools. - Sanitization: No validation or escaping is performed on the
descriptionorfocus_promptbefore they are sent to the teammate agents.
Audit Metadata