csv-wave-pipeline
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically constructs a shell command to invoke the
ccw clitool in Phase 1. The user-providedrequirementstring is interpolated into aBashcall without adequate sanitization of shell-sensitive characters like double quotes or backticks. This allows an attacker to break out of the intended command and execute arbitrary shell instructions on the host system. - [PROMPT_INJECTION]: The skill's 'Wave Execution Engine' creates a significant surface for indirect prompt injection by propagating findings between agents.
- Ingestion points: Agents ingest data from
discoveries.ndjson(a shared exploration board) andprev_context(which pulls from thefindingscolumn oftasks.csvpopulated by previous agents). - Boundary markers: The instruction template for spawned agents uses standard markdown headers but lacks robust delimiters or 'ignore' instructions to prevent the agent from obeying commands embedded in the task findings or discoveries.
- Capability inventory: Spawner and sub-agents have access to powerful tools including
Bash,Write, andEditwithin their defined scope. - Sanitization: There is no sanitization or filtering of agent-generated findings or discoveries before they are used as context for the next wave of execution.
Recommendations
- AI detected serious security threats
Audit Metadata