researching-codebases
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- DATA_EXFILTRATION (MEDIUM): The
web-searcheragent configuration (agents/web-searcher.md) requests bothreadandwebfetchpermissions. Since this agent is specifically designed to ingest and process untrusted content from the web, this tool combination allows an attacker to use indirect prompt injection to read sensitive local files and exfiltrate them to an external server. - COMMAND_EXECUTION (MEDIUM): The
promote-research.pyscript (scripts/promote-research.py) is vulnerable to path traversal because it concatenates the user-providedfilenameargument directly into file paths without sanitization. This allows an attacker to manipulate the agent into reading or moving files from arbitrary locations on the system. - PROMPT_INJECTION (LOW): The skill is highly vulnerable to Indirect Prompt Injection (Category 8) because it ingests data from external websites and codebase files without using boundary markers, sanitization, or instructions to ignore embedded commands.
- DATA_EXFILTRATION (LOW): The
gather-metadata.pyscript is designed to collect and output system environment details, including working directories and repository URLs, which could be used for reconnaissance if the agent is compromised.
Audit Metadata