complete-task
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions directly interpolate the
$ARGUMENTSvariable into shell commands, specificallytaskmd set $ARGUMENTS --status completed --verify. Since$ARGUMENTScontains raw user input, an attacker can inject shell metacharacters (e.g.,;,&&,|) to execute arbitrary commands with the agent's privileges. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests and acts upon content from external task files.
- Ingestion points: Task content is retrieved using
taskmd show <ID>(Step 1 inSKILL.md). - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands within the task files.
- Capability inventory: The agent has access to
Bash,Read, andEdittools, which could be abused if the agent obeys malicious instructions found in a task file. - Sanitization: None. The skill does not validate or sanitize the contents of the task files before processing them.
Recommendations
- AI detected serious security threats
Audit Metadata