loom-before-after
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill defines a framework for processing "loom plans" (YAML files) that contain shell commands in fields such as
truths,before_stage, andafter_stage. This creates a vulnerability to indirect prompt injection where an attacker could provide a malicious plan containing dangerous commands that the agent is then instructed to execute as part of its verification process. - Ingestion points: External YAML "loom plans" containing verification logic.
- Boundary markers: Not mentioned; instructions do not advise the agent to isolate or ignore instructions embedded within the processed data.
- Capability inventory: The skill relies on the
Bashtool to execute a variety of commands includingcargo,curl,grep,jq, and project-specific CLI tools. - Sanitization: No sanitization or validation of the commands provided in the YAML plans is described.
- [COMMAND_EXECUTION]: The templates and examples provided in the skill encourage the execution of arbitrary shell commands via the
Bashtool. Although the examples focus on standard development tasks (e.g., running tests withcargo, checking endpoints withcurlonlocalhost), this capability is the primary vector for potential abuse if combined with untrusted input.
Audit Metadata