knowledge-base
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill implements a
scancommand that analyzes the project codebase usingace-toolto extract domain concepts and terminology. - Ingestion points: Project source code files, class names, and comments via the
scananddiscovercommands inSKILL.md. - Boundary markers: None specified in the documentation to distinguish between code and potential malicious instructions embedded in comments.
- Capability inventory: File system write access (creating
.mdfiles indocs/knowledge/), local command execution viabunfor script logic, and generation of summary files (GLOSSARY.md,index.md). - Sanitization: No evidence of sanitization for code content before it is processed or interpolated into the knowledge base templates.
- [Command Execution] (MEDIUM): The skill relies on the
bunruntime to execute a local TypeScript entry point (lib.ts). - Evidence: Multiple commands in
SKILL.mdinvokebun ~/.pi/agent/skills/knowledge-base/lib.tswith various arguments includingscan,init, andcreate. - Risk: If the
lib.tsfile or its dependencies (likeace-tool) are compromised or handle malicious input poorly, it allows for arbitrary code execution on the user's machine. - [Data Exposure] (LOW): The
scananddiscoverfunctions process the entire project directory. - Evidence: The documentation specifies the knowledge base is stored in
./docs/knowledge/relative to the project root and scans the codebase state. - Risk: While a primary feature, this behavior could inadvertently expose sensitive configuration files or hardcoded secrets if they are present in the codebase and indexed into the Markdown knowledge base.
Recommendations
- AI detected serious security threats
Audit Metadata