self-test
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
executefunction inrun.pyis vulnerable to command injection. It constructs a shell command string by interpolating thepackageandtimeoutvariables directly from the inputargsdictionary without validation. This command is then executed viasubprocess.run(cmd, shell=True). An attacker could inject arbitrary shell commands by providing malicious values for these parameters. - Evidence:
cmd = f"CGO_ENABLED=0 go test {package} -v -json -timeout {timeout}"andsubprocess.run(cmd, shell=True, ...)inrun.py. - [REMOTE_CODE_EXECUTION]: The lack of input sanitization in the command execution logic allows for arbitrary code execution on the host system if the agent is manipulated into passing malicious arguments.
- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting output from an external tool (
go test) and using it to generate ananalysis_promptfor the agent's next steps. - Ingestion points: The skill parses
stdoutfrom thego testcommand inrun.py. - Boundary markers: No boundary markers or instructions to ignore embedded commands are present in the result processing.
- Capability inventory: The skill can execute shell commands via
subprocess.runinrun.py. - Sanitization: No sanitization or escaping is performed on the test output before it is incorporated into the skill's response.
Recommendations
- AI detected serious security threats
Audit Metadata