create-skill
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/run_eval.pyandscripts/run_loop.pyusesubprocess.Popento execute theclaudeCLI tool for testing how skills trigger. This allows the skill to automate the testing of agent behaviors. - [PROMPT_INJECTION]: The skill processes evaluation queries from an
eval_set.jsonfile which are used to improve skill descriptions via an AI model. This creates a surface for indirect prompt injection where malicious queries could influence the generated descriptions that are subsequently written to the filesystem and executed. Ingestion points:eval_set.jsonloaded inscripts/run_loop.py. Boundary markers: The prompt inscripts/improve_description.pyuses XML-like tags to separate components. Capability inventory: The skill has filesystem write access and the ability to execute CLI tools. Sanitization: There is no explicit sanitization of the generated description text before it is written to the command directory. - [DATA_EXPOSURE]: The
eval-viewer/generate_review.pyscript starts a local HTTP server (defaulting to port 3117) to serve content from the workspace directory for browser review, which could expose files within that directory to other users on the local network. - [EXTERNAL_DOWNLOADS]: The HTML viewer template in
eval-viewer/viewer.htmlincludes a script tag to load the SheetJS library fromcdn.sheetjs.comto enable Excel file rendering.
Audit Metadata