code-change-verification
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The scripts
run.shandrun.ps1executemakecommands. Sincemaketargets are defined in a localMakefile, an attacker-controlled repository can execute arbitrary shell commands when this skill is invoked. - [PROMPT_INJECTION] (HIGH): Categorized as Indirect Prompt Injection (Category 8). The skill treats the repository environment as input and possesses high-privilege execution capabilities. 1. Ingestion point: The repository's
Makefileand build configuration. 2. Boundary markers: None present. 3. Capability inventory: Arbitrary subprocess execution viamakeinrun.shandrun.ps1. 4. Sanitization: No validation ofMakefilecontent ormaketargets. - [PRIVILEGE_ESCALATION] (HIGH): The
SKILL.mdinstructions explicitly direct the agent to usepowershell -ExecutionPolicy Bypass. This is a known technique to circumvent system security restrictions on script execution.
Recommendations
- AI detected serious security threats
Audit Metadata