init-agent
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute shell commands (
ln -son Linux/macOS orNew-Itemon Windows) to create symbolic links between documentation files. It specifically requests the use of "PowerShell 管理员模式" (Administrator mode) on Windows to perform these operations. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads untrusted content from various project configuration files to generate instructions for other AI agents.
- Ingestion points: The skill scans
package.json,pyproject.toml,go.mod,Cargo.toml,composer.json,Makefile, andDockerfileto identify the tech stack and project structure. - Boundary markers: The provided
AGENTS.mdtemplate does not utilize specific delimiters or escape sequences to isolate data extracted from configuration files from the rest of the instruction set. - Capability inventory: The skill has the capability to read local files, write new documentation files, and execute shell commands to create symbolic links.
- Sanitization: There is no mention of sanitizing or validating the content retrieved from project configuration files before it is incorporated into the generated AI instructions.
Audit Metadata