skills/eoic/papyrus/project-planner/Gen Agent Trust Hub

project-planner

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWCOMMAND_EXECUTION
Full Analysis

A comprehensive security analysis was performed on all 7 files associated with the 'Project Planner' skill, adopting an 'assume-malicious' posture. Each file was evaluated for prompt injection, data exfiltration, obfuscation, unverifiable dependencies, privilege escalation, persistence mechanisms, metadata poisoning, indirect prompt injection, and time-delayed/conditional attacks.

  1. README.md: This file serves as documentation. No prompt injection patterns, data exfiltration attempts, obfuscation, or other malicious behaviors were detected. Role definitions for the AI (e.g., 'Project Architect') are benign and do not attempt to bypass safety.

  2. SKILL.md: This is the core skill definition, providing templates and guidance for the AI. Similar to README.md, no prompt injection, data exfiltration, obfuscation, or other malicious patterns were found. The Python-like code blocks are illustrative structures for AI generation, not executable code within the LLM's environment. Metadata fields were checked and found to be benign.

  3. assets/requirements-template.md: This is a static Markdown template. It contains no executable code or instructions and is therefore safe.

  4. plugin.json: This file contains standard plugin metadata. The 'name' and 'description' fields were checked for metadata poisoning and found to be benign. The 'homepage' and 'repository' URLs are informational references and do not trigger any external downloads or dependencies within the skill's execution.

  5. references/domain-templates.md: This is a static reference document providing domain-specific patterns. It contains no executable code or instructions and is therefore safe.

  6. scripts/generate_project_docs.py: This Python script is designed to generate project documents. It uses standard Python libraries (json, argparse, datetime, typing, os). The script performs local file I/O operations to create Markdown documents in a user-specified output directory (os.makedirs, open(filepath, 'w')). It does not access sensitive file paths (e.g., ~/.aws/credentials, ~/.ssh/id_rsa), make any network requests, attempt privilege escalation (sudo, chmod 777), or establish persistence mechanisms. No obfuscation was detected. The script's functionality is limited to benign local file creation.

  7. scripts/validate_documents.py: This Python script is designed to validate the generated project documents. It uses standard Python libraries (re, argparse, typing, os). The script reads the content of user-specified Markdown files (open(filepath, 'r')) and performs regex-based validation checks. It does not access sensitive file paths, make network requests, attempt privilege escalation, or establish persistence mechanisms. No obfuscation was detected. The script's functionality is limited to benign local file reading and content analysis.

Conclusion: All files are free of malicious patterns. The Python scripts, while involving command execution, are safe and perform only intended local file operations without any harmful side effects. The skill's primary function of generating structured text documents is also safe.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 12:58 PM