optimize-description
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute Python scripts (run_loop.pyandgenerate_report.py) located in a directory relative to the skill root (../skill-shaper/scripts/). These scripts are external to the skill's own directory, which introduces a dependency on external code that cannot be verified from the skill definition alone.\n- [PROMPT_INJECTION]: The skill uses an$ARGUMENTSvariable to define a file path that is subsequently used in a shell command. If the agent does not properly sanitize this input, it could be susceptible to command injection if a malicious user provides input containing shell operators.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. Ingestion points: evaluation queries from.skill-eval/evals/and the skill's ownSKILL.md. Boundary markers: None provided to delimit untrusted query data. Capability inventory:Bashexecution andWriteaccess to the file system. Sanitization: No validation or filtering of input data is mentioned before processing or writing back to files.
Audit Metadata