init-skill
Warn
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes a computed script path containing relative traversal (
../skill-shaper/scripts/init_skill.py) to execute a script outside the skill's own directory scope. This relies on an assumed directory structure and can be used to execute unintended files if the environment is manipulated. - [PROMPT_INJECTION]: The skill is vulnerable to indirect injection and shell command injection via the
$ARGUMENTSvariable. - Ingestion points: Untrusted user input enters the agent context through the
$ARGUMENTSplaceholder inSKILL.md. - Boundary markers: None; the variable is interpolated directly into the bash shell command without quotes or delimiters.
- Capability inventory: The skill uses the
Bashtool to executepython3with the provided arguments. - Sanitization: No escaping, validation, or filtering is performed on the
$ARGUMENTSbefore they are passed to the shell, allowing for the execution of arbitrary commands via characters such as;,&, or|. - [COMMAND_EXECUTION]: The execution of
python3 "$SCRIPT" $ARGUMENTSis inherently unsafe as it allows shell metacharacters in$ARGUMENTSto break out of the intended command context.
Audit Metadata