project-steward
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill performs frequent subprocess calls to a local CLI tool (
steward.py) with arguments derived from project data. - Evidence: Multiple commands in the 'Tool Mapping' section (e.g.,
python skills/project-steward/scripts/steward.py log --scenario "...") use dynamic string interpolation for arguments. - Risk: If the agent populates these arguments with unsanitized content from the codebase or user input, it may lead to command injection vulnerabilities depending on how
steward.pyor the underlying shell handles the input. - [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8) due to its extensive data ingestion and high-privilege capabilities.
- Ingestion Points: The
scancommand reads the entire codebase (AST-based), while other commands readdocs/roadmap.md,docs/errors.md, anddocs/memory.md(viaSKILL.mdworkflows). - Boundary Markers: Absent. The instructions do not provide delimiters or warnings to ignore instructions found within the processed files.
- Capability Inventory: The agent is authorized to edit code files, execute CLI scripts, and update project documentation.
- Sanitization: Absent. There is no mention of validating or escaping external content before it is processed or used in commands.
- Risk: Malicious instructions hidden in code comments or bug reports could trick the agent into performing unauthorized file modifications or executing arbitrary commands during automated workflows like 'Standard Fix Process'.
- [DATA_EXFILTRATION] (MEDIUM): The 'Code Navigator' and 'Memory Manager' capabilities allow the agent to traverse the entire project structure and aggregate context.
- Risk: While no direct network exfiltration is visible, the agent's ability to summarize and consolidate project data (via
steward.py memory) could be leveraged via indirect injection to move sensitive data (like hardcoded keys found during a scan) into less-protected documentation files.
Recommendations
- AI detected serious security threats
Audit Metadata