workflow-lite-execute
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill is vulnerable to shell injection. In the
executeBatchfunction, it constructs a command for theccwCLI by interpolating the results ofbuildExecutionPrompt(batch)directly into aBashtool call. This prompt contains unsanitized user input and file content, allowing an attacker to execute arbitrary system commands by including shell metacharacters like backticks or subshell markers. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface. It ingests untrusted data from user-specified files and structured task definitions and passes it to sub-agents and external tools without sanitization. Ingestion points:
Read(filePath),.task/*.json, andexecutionContext. Boundary markers: Markdown headers. Capability inventory:Bash,Agent,Read,Write,Edit,Glob,Grep. Sanitization: None. - [DATA_EXFILTRATION]: The skill allows arbitrary file reading based on user-provided paths. Combined with the command execution capabilities and the network-enabled
ccwtool, this poses a risk of sensitive data exposure and exfiltration.
Recommendations
- AI detected serious security threats
Audit Metadata