docs-update
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): High vulnerability to indirect prompt injection (Category 8) due to unrestricted codebase analysis combined with file-modification capabilities. Ingestion points: The skill reads arbitrary project files via
scoutagents and 'actual source files' during the documentation update phase. Boundary markers: None identified; the skill does not use delimiters or instructions to ignore embedded commands in the source code it reads. Capability inventory: Extensive file-write access toREADME.mdand multiple files within thedocs/directory. Sanitization: None present; the agent is instructed to directly verify and incorporate code evidence into its documentation output. - COMMAND_EXECUTION (LOW): The skill executes
ls -lato map the directory structure. This is a standard reconnaissance command used to identify project targets for subsequent reading and writing operations.
Recommendations
- AI detected serious security threats
Audit Metadata