update-task
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to build a shell command (
taskmd set <ID> --flags) directly from the$ARGUMENTSvariable. There is no requirement for input validation or shell-escaping, making the system vulnerable to command injection via shell metacharacters like;,&, or|. - [PROMPT_INJECTION]: The skill accepts direct user input from
$ARGUMENTSto determine task IDs and field values without explicit instructions to ignore potentially malicious instructions or to use safe parsing methods, allowing the user to influence agent behavior. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface with the following attributes: (1) Ingestion points: Untrusted data enters via
$ARGUMENTSinSKILL.md; (2) Boundary markers: None are present to delimit user input from instructions; (3) Capability inventory: The skill has access toBash,Read, andEdittools inSKILL.md; (4) Sanitization: There are no instructions to sanitize or validate external content before interpolation into theBashtool.
Recommendations
- AI detected serious security threats
Audit Metadata