artifact-management
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
readaction inrun.pyis vulnerable to path traversal. The script joins the base directory_ARTIFACTS_DIRwith a user-providednameargument without verifying that the resulting path remains within the intended directory. This allows an attacker to read sensitive files like~/.ssh/id_rsaor.envusing sequences like../../. - [COMMAND_EXECUTION]: The
createanddeleteactions inrun.pyallow for arbitrary file creation, modification, and deletion outside the artifacts folder via path traversal. An attacker could overwrite configuration files or delete critical system data by providing maliciousnameparameters. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by allowing untrusted data to be persisted and later retrieved.
- Ingestion points: The
contentparameter of thecreatefunction inrun.pyaccepts arbitrary input. - Boundary markers: None; the skill does not use delimiters or warnings to separate stored data from instructions when files are read.
- Capability inventory: The skill includes file I/O operations and requests
bashtool access inSKILL.md. - Sanitization: None; there is no validation or escaping of the content being stored or the file paths used.
Audit Metadata