go-create-chi-router
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is vulnerable to indirect injection because it processes untrusted user input to determine file system paths and code structure without sanitization.
- Ingestion points: The
<module>and<resource>placeholders in the file path and Go templates are populated from user instructions. - Boundary markers: No delimiters or instructions to ignore embedded commands in the user-provided names are present.
- Capability inventory: The skill workflow includes writing files to the filesystem and executing the
make lintcommand. - Sanitization: There is no evidence of validation or escaping for the module or resource names, allowing for potential path traversal (e.g., using
../../in a resource name). - [Command Execution] (MEDIUM): The skill mandates the execution of local system commands after code generation.
- Evidence: Rule 12 and Workflow step 6 require running
make lint. - Risk: If the generated code is successfully poisoned via indirect injection, the subsequent execution of build or linting tools can be leveraged for further exploitation.
- [External Downloads] (MEDIUM): The generated code templates depend on untrusted external Go packages.
- Evidence: Imports of
github.com/cristiano-pacheco/bricksandgithub.com/cristiano-pacheco/pingoin the router implementation. - Status: These repositories are not within the defined [TRUST-SCOPE-RULE] for trusted organizations.
Recommendations
- AI detected serious security threats
Audit Metadata