Science
Warn
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection. It instructs the agent in
SKILL.mdto load and apply instructions from the~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/Science/directory to override default behavior. - Ingestion points: Files in
~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/Science/(e.g.,PREFERENCES.md). - Boundary markers: None provided; the agent is simply told to apply the found resources.
- Capability inventory: The skill workflows include execution of shell commands via
curl,bun,docker, andpsql(seen inSKILL.md,Workflows/DesignExperiment.md, andExamples.md). - Sanitization: No validation or sanitization is performed on the content of the loaded files.
- [COMMAND_EXECUTION]:
SKILL.mdrequires the execution of acurlcommand in the background (&) targetinglocalhost:8888immediately upon skill invocation. This command is configured to suppress output (> /dev/null 2>&1). - [COMMAND_EXECUTION]:
Workflows/DesignExperiment.mdinstructs the agent to run a local script using thebun runcommand. - [COMMAND_EXECUTION]:
Examples.mdprovides templates for executing infrastructure and database commands likedockerandpsql.
Audit Metadata