Cost Optimization Analyzer
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
DevelopmentCostAnalyzerclass inSKILL.mdemployssubprocess.runwithshell=Trueto execute git commands. This is a security best practice violation as it unnecessarily exposes the application to shell-based vulnerabilities during command execution. - [COMMAND_EXECUTION]: The
optimize-infrastructure.shscript executes several shell-based monitoring commands (top,free,df) and database operations viapsql. The use of environment variables like$DATABASE_URLin shell commands can be risky if the variable contents are not strictly controlled. - [EXTERNAL_DOWNLOADS]: The skill documentation recommends installing standard and reputable Python packages including
psutil,plotly,streamlit, andredisfor system monitoring and data visualization. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its data processing flow:
- Ingestion points: The skill ingests untrusted git commit messages through the
analyze_git_velocitymethod inSKILL.md. - Boundary markers: There are no boundary markers or explicit instructions provided to the agent to disregard potential instructions embedded within the git logs.
- Capability inventory: The skill possesses significant capabilities including shell execution via
subprocess.runand network communication viahttpxandaioredis. - Sanitization: The implementation parses commit messages using simple string matching without any escaping or structural validation, which could allow malicious commit content to influence agent behavior.
Audit Metadata