Orchestration Planner
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- PROMPT_INJECTION (LOW): Indirect Prompt Injection surface. The script
plan-workflow.shinterpolates the user-provided--goalargument directly into a Codex LLM prompt. An attacker could provide a goal containing instructions to ignore previous rules or extract the system prompt. - Ingestion points:
GOALvariable inplan-workflow.sh(derived from--goalCLI argument). - Boundary markers: Absent. The goal is placed directly inside the prompt string.
- Capability inventory: Uses
codex execandpython3to process data; writes to/tmp/files. - Sanitization: None. The script directly inserts the raw shell variable into the heredoc-style prompt.
- COMMAND_EXECUTION (SAFE): While the skill executes shell and Python scripts, these are local scripts bundled with the skill. The use of
codex execis a known tool for this environment. - DATA_EXFILTRATION (SAFE): The skill reads a capability graph and writes results to
/tmp/, but no exfiltration to external domains was detected.
Audit Metadata