confluence-page-viewer
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute commands such asconfluence-cli read PAGE_URLandmkdir -p OUT_DIR. These commands incorporate variables (PAGE_URL,OUT_DIR) derived directly from user-provided arguments. If an attacker provides a URL or directory name containing shell metacharacters (e.g.,; rm -rf /), it could lead to arbitrary command execution if validation is bypassed. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection by design, as its primary purpose is to ingest and process data from external sources.
- Ingestion points: Data is ingested from external Confluence pages via
confluence-cli(SKILL.md). - Boundary markers: There are no explicit markers or instructions to ignore embedded commands within the
references/output-format.mdtemplate. - Capability inventory: The agent has access to sensitive tools including
Bash,Write, andEdit, which could be abused if malicious instructions in a Confluence page are followed. - Sanitization: While the URL format is validated, there is no evidence of sanitization or filtering for the actual content retrieved from the page.
- [EXTERNAL_DOWNLOADS]: The skill requires the user to install a third-party tool,
confluence-cli, from an unverified GitHub repository (github.com/pchuri/confluence-cli). This introduces a dependency on external code that does not originate from a known trusted organization.
Audit Metadata