novel-writer
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION] (HIGH): Path Traversal vulnerability in file handling logic.
- Evidence: In
main.py, thebook_nameis extracted directly from user input using the regexre.search(r"《(.*?)》", instruction). - Evidence: This
book_nameis passed totools.pymethods likeget_character_profiles,get_outline, andsave_chapter. - Evidence:
tools.pyconstructs file paths usingself.novels_root / book_namewithout validating or sanitizing the input for path traversal sequences like../. - Impact: A malicious user could provide an instruction like
续写《../../.ssh/id_rsa》to attempt reading sensitive files or续写《../../.bashrc》to overwrite system configuration files. - [PROMPT_INJECTION] (LOW): Strong instructional constraints on AI behavior.
- Evidence:
main.pyincludes blocks like【反AI写作风格指南(强制执行)】andCRITICAL WORKFLOW ENFORCEMENT. - Context: These are functional overrides intended to maintain a specific creative writing style and enforce the skill's workflow. They do not attempt to bypass core safety guardrails.
Recommendations
- AI detected serious security threats
Audit Metadata