System Diagnostician
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
diagnose.shscript is vulnerable to shell command injection due to unsafe variable interpolation. - Evidence: The script reads
package.jsoninto a variable and interpolates it directly into a double-quoted string passed tocodex exec. Since the content ofpackage.jsonis untrusted and can contain double-quote characters, an attacker can craft a file (e.g.,"; touch /tmp/pwned; #") that breaks out of the shell string and executes arbitrary commands on the host. - PROMPT_INJECTION (LOW): The skill is highly susceptible to Indirect Prompt Injection (Category 8) because it processes untrusted project data.
- Ingestion points:
diagnose.shingests raw file content frompackage.jsonand file paths from the project directory viafind. - Boundary markers: Absent. The content is directly embedded into the AI prompt without any delimiters or instructions to treat it as data only.
- Capability inventory: The script can read any file in the project, write to
/tmp, and execute shell commands. - Sanitization: None. The script performs no validation or escaping of the file content before sending it to the AI model.
- DATA_EXFILTRATION (LOW): The skill transmits repository metadata and file contents to an external AI provider via the
codextool. While documented in the manifest's side effects, this constitutes egress of potentially sensitive codebase information. - Metadata Poisoning (MEDIUM): The
manifest.yamlclaims arisk_levelofsafe, which is misleading given the critical shell injection vulnerabilities present in the implementation.
Recommendations
- AI detected serious security threats
Audit Metadata