context-manager

Fail

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONNO_CODE
Full Analysis
  • [COMMAND_EXECUTION]: The router.sh script is vulnerable to command injection through unsafe shell expansion. It uses unquoted or unsafely expanded positional parameters ($*) inside double-quoted echo statements, which allows for the execution of command substitutions (e.g., $(...) or backticks) if they are present in the arguments.
  • File: router.sh
  • Evidence: echo "Target: $", echo "Libraries: $", echo "Source: $", echo "Goal: $"
  • [PROMPT_INJECTION]: The skill design creates an indirect prompt injection surface as it is intended to process external documentation and harvest content from files.
  • Ingestion points: fetch operation (retrieving external library documentation from well-known sources like Drizzle ORM or Next.js) and harvest operation (processing summary files).
  • Boundary markers: None identified in the provided script or documentation.
  • Capability inventory: File system operations (claims to cleanup, organize, and compress) and shell execution via router.sh.
  • Sanitization: The provided shell script contains no sanitization or escaping logic for handled data.
  • [NO_CODE]: The router.sh script is a placeholder that only outputs text to the console. It does not implement the functional logic for the advertised operations such as file discovery, fetching, harvesting, or cleanup.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 14, 2026, 07:09 PM