dreamina-batch-management
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- PROMPT_INJECTION (HIGH): The skill contains explicit instructions to bypass safety checks, stating that commands should be 'directly executed' and 'without user confirmation' (无需用户确认). This is a direct violation of safety guidelines designed to prevent autonomous execution of sensitive operations.- COMMAND_EXECUTION (MEDIUM): The workflow relies on the execution of shell commands like
mkdirandcurl. While these are functional for the task, the instruction to automate them without oversight increases the risk of command injection if parameters are not properly sanitized.- EXTERNAL_DOWNLOADS (MEDIUM): The skill automates the downloading of files viacurl. Without a confirmation step, the agent could be manipulated into downloading malicious payloads or interacting with attacker-controlled endpoints.- DATA_EXFILTRATION (LOW): Although no explicit exfiltration is present, the ability to runcurlwithout confirmation provides a primitive that could be exploited to transmit local data to external servers.- INDIRECT PROMPT INJECTION (LOW): The skill processes external data (API responses and user prompts) and uses them to construct shell commands. Evidence: 1. Ingestion points: User prompts and API polling results; 2. Boundary markers: Absent; 3. Capability inventory:curl,mkdir, and file writing; 4. Sanitization: Not specified.
Recommendations
- AI detected serious security threats
Audit Metadata