workhub
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Path traversal vulnerabilities exist in several commands. In
commands/read.ts, thereadcommand joins the documentation root with user-provided input without validation, allowing access to files outside the intended directory via..sequences. Incommands/create.ts, thecreateIssueandcreatePRfunctions use user-suppliedcategoryanddescriptionstrings to construct directory paths and filenames, which permits arbitrary file creation outside the targetdocs/folder if malicious paths are provided. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its document processing workflow.
- Ingestion points: File content is ingested from the
docs/directory into the agent's context viacommands/read.ts,commands/search.ts, andcommands/list.ts. - Boundary markers: Absent; the skill outputs the raw, unsanitized content of markdown files directly to the agent without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill possesses significant file system capabilities, including directory creation (
mkdir), file writing (writeFile), and file reading (readFile). - Sanitization: Absent; no validation or filtering of markdown content is performed to prevent the execution of embedded instructions, and path inputs are not sanitized to prevent traversal.
Audit Metadata