blog-writing-mastery
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill workflow in Phase 6 utilizes the
run_commandtool to executenode scripts/seed_blogs.js. This operation executes logic that depends on the state ofscripts/blog_data.js, a file modified by the agent immediately prior to execution. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface in its database seeding phase. Ingestion points: User-controlled or agent-generated content, specifically
[FULL_MARKDOWN_CONTENT]and[BLOG_TITLE], are written directly into thescripts/blog_data.jsfile. Boundary markers: There are no boundary markers or delimiters provided to isolate the injected content from the surrounding Javascript object structure. Capability inventory: The agent has access torun_command,write_to_file, andreplace_file_content, enabling both the modification and execution of scripts. Sanitization: No instructions are provided for sanitizing or escaping characters in the blog content (e.g., quotes or semicolons), which could allow malicious content to escape the Javascript string context and execute arbitrary code when the seed script is run.
Audit Metadata