acc-check-file-io
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is designed to ingest and analyze untrusted external PHP source code. This creates a significant attack surface where instructions embedded in code comments or string literals could bypass the agent's logic.
- Ingestion points: The skill uses
Grepcommands to scan all**/*.phpfiles in a provided directory. - Boundary markers: No specific boundary markers or delimiters are defined to separate the untrusted PHP content from the agent's core instructions.
- Capability inventory: The skill utilizes
bashandGrepto execute searches across the filesystem. While it doesn't currently write files, the results of these searches influence the structured output provided to the user/agent. - Sanitization: No sanitization or filtering of the PHP file content is performed before processing or displaying it.
- Command Execution (MEDIUM): The skill documentation includes raw
bashgrep patterns. If the agent executes these verbatim on a system, it could be vulnerable to argument injection or command chaining if the file paths or search terms are dynamically generated from user input.
Recommendations
- AI detected serious security threats
Audit Metadata