soul-self-evolution
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
rollbackfunction inrun.pyaccepts an absolute path as thecheckpointargument. This allows the skill to read the content of any system file accessible to the process and write it directly into theSOUL.mdfile, which defines the agent's core behavior and instructions.\n- [PROMPT_INJECTION]: The safety mechanism in theapplyfunction, which is intended to protect sections like 'Safety Guardrails', can be bypassed because the list of protected sections is taken from input arguments. An attacker can provide an emptyimmutable_sectionslist to overwrite any part of the file.\n- [PROMPT_INJECTION]: The primary function of this skill is to modify the agent's behavioral configuration (SOUL.md). This creates a persistent surface for prompt injection where malicious instructions can be permanently embedded into the agent's persona.\n- [DATA_EXFILTRATION]: By using therollbackfunction to read sensitive files (e.g., SSH keys or configuration files) and writing them into the agent's instructions, the skill facilitates the exposure of sensitive data to the LLM, which can then be exfiltrated through subsequent agent responses.\n- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection as it processes external observations and changes without sanitization.\n - Ingestion points: The
observationsargument in theproposefunction and thechangesargument in theapplyfunction (file:run.py).\n - Boundary markers: Absent; the content is written directly into the target markdown sections without delimiters or instructions to ignore embedded commands.\n
- Capability inventory: The skill uses
path.write_text()to modify local files, providing a high-impact capability for successful injections.\n - Sanitization: Absent; there is no validation or escaping of the content provided by the agent's context or external triggers.
Recommendations
- AI detected serious security threats
Audit Metadata