swain-status
Warn
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to dynamically locate shell scripts using
findand execute them viabash. This pattern of dynamic path computation (e.g., searching forswain-status.shorchart.sh) can lead to unintended code execution if a malicious file with a matching name is placed within the search paths. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted data from GitHub issues and local project artifacts. 1. Ingestion points: GitHub issue titles and markdown descriptions in project artifacts. 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used in the agent summary template. 3. Capability inventory: The agent has access to the
Bashtool for command execution and file reading. 4. Sanitization: Although scripts usejqfor internal data handling, the final summary presented to the user lacks sanitization or clear separation of external content. - [EXTERNAL_DOWNLOADS]: The skill uses the official
ghCLI to fetch issue and user data from GitHub. While this uses a well-known and trusted service, the data returned is processed by the agent, contributing to the indirect injection surface.
Audit Metadata