contract-generator
Warn
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: MEDIUMPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill processes untrusted input from DOCX templates and data files (CSV/JSON) using string replacement without sanitization. This allows for indirect prompt injection if the resulting documents are interpreted by other AI agents or users.
- Ingestion points:
scripts/contract_generator.py(methodsload_template,batch_generate, and JSON loading in__main__). - Boundary markers: Absent; variable replacement uses simple
{{key}}syntax without delimiters or escape sequences. - Capability inventory: Local file system write (DOCX generation).
- Sanitization: Absent; the skill performs direct string replacement.
- Prompt Injection (MEDIUM): In
scripts/contract_generator.py, thebatch_generatemethod uses theoutput_filenamecolumn from the input CSV directly inos.path.join(output_dir, filename). This allows a malicious CSV file to perform a path traversal attack by specifying relative paths (e.g.,../../target) to write files outside of the intended output directory.
Audit Metadata