json-and-csv-data-transformation
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for the user or agent to execute commands with elevated privileges using
sudoto install software packages (sudo apt-get install -y jq csvkit).\n- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection by processing untrusted external data via powerful shell utilities.\n - Ingestion points: The skill processes data from multiple external sources including
data.json,users.json,data.csv, and other files used in the examples.\n - Boundary markers: There are no explicit delimiters or boundary markers used in the scripts to differentiate data from instructions, allowing for potential interpretation of data as commands.\n
- Capability inventory: The skill utilizes
jq,csvkitutilities, andawk, all of which provide extensive data manipulation and potentially unsafe execution capabilities.\n - Sanitization: The provided examples and Node.js code do not include validation or sanitization of input data before passing it to system commands or shell processors.
Recommendations
- AI detected serious security threats
Audit Metadata