council
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- PROMPT_INJECTION (LOW): The skill exhibits an Indirect Prompt Injection attack surface (Category 8). It instructs agents to ingest and process untrusted external data (codebase files and diffs) which is interpolated into prompts via variables like
{JSON_PACKET}and{FILES_AND_DIFFS}. - Ingestion points: Untrusted data enters the agent context through the
{JSON_PACKET}(inreferences/personas.md),{PACKET}(inreferences/cli-spawning.md), and{FILES_AND_DIFFS}(inreferences/quick-mode.md) variables. - Boundary markers: The prompt templates provided in
references/personas.mdandreferences/quick-mode.mddo not utilize delimiters (e.g., XML tags or unique markers) or specific 'ignore instructions within data' warnings to prevent the LLM from obeying instructions embedded in the analyzed code. - Capability inventory: The 'Explorer' sub-agents are explicitly granted access to high-privilege tools including
Bash,Glob,Grep, andRead(as documented inreferences/explorers.md). - Sanitization: There is no evidence of sanitization or escaping logic to handle malicious payloads within the files or diffs being analyzed.
- COMMAND_EXECUTION (SAFE): While the documentation in
references/cli-spawning.mddescribes the use ofcodex execwith a{PACKET}placeholder which could be vulnerable to shell injection if poorly implemented in a harness, the skill itself does not contain executable implementation scripts for this operation; it only defines the capability contract. The providedscripts/validate.shis a benign self-test script.
Audit Metadata