confluence-page-viewer
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes Bash commands by directly interpolating user-provided arguments
$ARGUMENTS[0](the URL) and$ARGUMENTS[1](the output directory). Specifically, the commandsnpx confluence-cli read $ARGUMENTS[0]andmkdir -p $ARGUMENTS[1]are executed without escaping or sanitization. An attacker could provide a malicious URL or directory path containing shell metacharacters (e.g.,;,&,|) to execute arbitrary code on the system. - [EXTERNAL_DOWNLOADS]: The skill instructions mandate the use of
npx confluence-cli, which triggers a download of the package from the npm registry if it is not already present. This package is maintained by an individual contributor (pchuri) rather than a trusted organization, posing a risk of supply chain compromise. - [REMOTE_CODE_EXECUTION]: The use of
npxto run a third-party CLI tool effectively executes remote code from an external repository at runtime. This is a high-risk pattern when the source is not a verified vendor. - [PROMPT_INJECTION]: The skill ingests untrusted data from Confluence pages and generates a summary using an LLM. Since it lacks boundary markers or instructions to ignore embedded commands in the source data, it is vulnerable to indirect prompt injection. Malicious instructions placed on a Confluence page could hijack the agent's behavior, particularly given its access to powerful tools like Bash and Write.
Recommendations
- AI detected serious security threats
Audit Metadata