implement-retry-logic
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The script
scripts/add_retry_logic.pyis vulnerable to indirect prompt injection.\n - Ingestion points: Command-line arguments
--retriableand--permanentinscripts/add_retry_logic.pyare used to define exception lists for retry blocks.\n - Boundary markers: Absent. There is no validation to ensure inputs are valid identifiers or safe strings, and no delimiters are used to separate user data from generated code.\n
- Capability inventory: The script uses
Path.write_textto modify source code files and adds imports from the vendor-ownedproject_watch_mcppackage.\n - Sanitization: Absent. Exception lists are joined and injected directly into a Python code template via f-strings before being parsed by
ast.parse. This allows a malicious input to break out of the intended syntax (e.g., by including a closing parenthesis and new lines) and inject arbitrary Python commands into the target file.\n- [REMOTE_CODE_EXECUTION]: The skill utilizes dynamic code generation and filesystem modification to automate codebase updates.\n - The script
scripts/add_retry_logic.pyassembles Python code blocks as strings and parses them into AST nodes at runtime.\n - The modified code is written back to local files using
ast.unparseandPath.write_text. While this is the primary purpose of the skill, the generation process lacks security controls to prevent unintended code injection if the agent is directed by an untrusted source to modify a file.
Audit Metadata