project-estimator
Warn
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.mddirect the AI agent to execute shell commands such ascpandpythonto copy templates and run scripts. - [COMMAND_EXECUTION]: The skill depends on external scripts (
unpack.pyandpack.py) located at/mnt/skills/public/docx/scripts/which are not included in the analyzed file set, making their behavior unverifiable. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) because it interpolates user-provided data, specifically the project name
[proyecto], directly into shell command strings. A malicious user could provide a project name containing shell metacharacters (e.g.,; rm -rf /) to execute unauthorized commands. - Ingestion points: User project names and functional requirements collected during the estimation workflow.
- Boundary markers: Absent; user input is directly placed into shell command templates.
- Capability inventory: Shell command execution via
cpand execution of Python scripts via thepythoninterpreter. - Sanitization: No sanitization or validation of the project name or other user-supplied variables is specified in the instructions.
Audit Metadata