faion-ba-core

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (CRITICAL): An automated scanner (URLite) identified a blacklisted malicious URL (ID: Blacklist|UR4EFAFDCAD26E3E52-0200|urlb) within the requirements.md file. This indicates a verified connection to malicious infrastructure.
  • [PROMPT_INJECTION] (LOW): The skill possesses a surface for Indirect Prompt Injection (Category 8) due to its auto-investigation of external data. 1. Ingestion points: Skill reads untrusted files in .aidocs/, docs/, requirements/, and STAKEHOLDERS.md as defined in SKILL.md. 2. Boundary markers: Absent; there are no delimiters or instructions to ignore embedded prompts in ingested data. 3. Capability inventory: The skill is granted Write, Edit, and Task tools, allowing for filesystem modification. 4. Sanitization: Absent; no validation logic is applied to text processed during requirements extraction.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:27 PM