meeting-notes
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- PROMPT_INJECTION (LOW): Surface for Indirect Prompt Injection detected. The skill ingests raw meeting notes and interpolates them directly into a prompt template without boundary markers or instructions for the LLM to ignore potentially malicious embedded content.
- Ingestion points:
run.pyacceptsnotesstring or reads content from afilepath. - Boundary markers: Absent. The
format_promptinrun.pyconcatenates instructions directly with raw input. - Capability inventory: File reading via
pathlib.Path.read_text. - Sanitization: None.
- DATA_EXFILTRATION (LOW): Unrestricted file access. The
collectfunction inrun.pyreads content from any user-providedfile_path. This capability could be exploited to expose sensitive local files if an attacker provides a path like/etc/passwdor~/.ssh/id_rsavia indirect prompt injection.
Audit Metadata