writing-skills
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- Prompt Injection (HIGH): The file
persuasion-principles.mdandexamples/CLAUDE_MD_TESTING.mdexplicitly document and advocate for the use of behavioral manipulation techniques to bypass AI rationalization and internal reasoning. - It utilizes 'Authority' and 'Commitment' principles using markers like 'YOU MUST', 'No exceptions', and 'If you didn't use it, you failed'.
- It references research specifically focused on persuading AI to comply with 'objectionable requests', providing a blueprint for bypassing alignment and safety filters through psychological pressure.
- Command Execution (MEDIUM): The script
render-graphs.jsuseschild_process.execSyncto invoke the systemdot(Graphviz) binary. - While it uses
stdinfor input rather than shell interpolation, it still grants an external binary access to process untrusted data extracted from markdown files. - Indirect Prompt Injection (HIGH): The
render-graphs.jsscript provides a significant attack surface (Category 8). - Ingestion points: The script reads raw content from
SKILL.md(untrusted data). - Boundary markers: None. It uses regex to extract content between triple backticks.
- Capability inventory: Uses
execSyncto run subprocesses andfs.writeFileSyncto write files to the disk. - Sanitization: No validation or sanitization is performed on the
dotcontent before it is passed to the system command. If the Graphviz installation is configured with features likegvpror file inclusion enabled, an attacker-controlledSKILL.mdcould achieve arbitrary file read/write or code execution.
Recommendations
- AI detected serious security threats
Audit Metadata