code-refactoring-context-restore
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill's core functionality is to ingest external project data and integrate it into the agent's reasoning context, creating a significant attack surface. • Ingestion points: Data is retrieved from external sources via
VectorDatabase.search(sub-skills/1-semantic-vector-search.md) and project file identifiers. • Boundary markers: The provided instructions and sub-skills lack any delimiters or 'ignore' warnings for the rehydrated content. • Capability inventory: The skill uses thecontext-restoreCLI tool and performs decision-making based on retrieved 'historical impact' scores (sub-skills/2-relevance-filtering-and-ranking.md). • Sanitization: There is no evidence of sanitization or structural validation for the data returned from the vector database before it is rehydrated into the session. - [Command Execution] (LOW): The documentation (sub-skills/workflow-2-cross-project-knowledge-transfer.md) directs the agent to execute the
context-restorecommand with various flags. This is considered low risk on its own but facilitates the impact of an indirect injection if command arguments are influenced by poisoned context.
Recommendations
- AI detected serious security threats
Audit Metadata