drone-inspection-specialist
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The
reference.mdfile contains several instances ofsubprocess.runbeing used to execute external system commands for COLMAP and 3D Gaussian Splatting training. These implementations use dynamic paths (e.g.,self.colmap_path) and execute local scripts (e.g.,convert_to_web.py) which are not provided within the skill itself, creating a risk of arbitrary command execution if parameters are manipulated. - EXTERNAL_DOWNLOADS (MEDIUM): The
allowed-toolssection inSKILL.mdpermits the use ofpip:*andpython:*viaBash. This allows the agent to download and install arbitrary external packages from public repositories, which is a primary vector for supply chain attacks and remote code execution. - INDIRECT_PROMPT_INJECTION (LOW): The skill is configured to use
WebFetchandmcp__firecrawl__firecrawl_searchto ingest external data. This ingestion surface is vulnerable to indirect prompt injection where malicious instructions embedded in web pages or search results could attempt to override the agent's behavior. - DATA_EXPOSURE (LOW): The processing of video and image metadata, including GPS extraction as shown in
reference.md, involves handling sensitive location data. While appropriate for the task, it represents a data surface that could be targeted for exfiltration if the agent's network tools are misused.
Audit Metadata