daily-notes
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Path traversal vulnerability in
daily-note.sh. Thecmd_get_notefunction accepts a user-controlleddate_inputto construct a file path ($NOTES_DIR/${date_input}.md) without validation, allowing for unauthorized access to arbitrary Markdown files via traversal sequences (e.g.,../../). - [PROMPT_INJECTION]: Susceptibility to indirect prompt injection.
- Ingestion points: Markdown files are read from the filesystem using
catindaily-note.sh. - Boundary markers: No delimiters or instructions are used to distinguish note content from system commands.
- Capability inventory: The skill possesses file read/write (
cat,touch), directory creation (mkdir), and local network access (curl) capabilities. - Sanitization: Note content is not sanitized or validated before being provided to the agent, potentially allowing embedded instructions to influence agent behavior.
Recommendations
- AI detected serious security threats
Audit Metadata