faion-ba-core
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (CRITICAL): An automated scanner (URLite) identified a blacklisted malicious URL (ID: Blacklist|UR4EFAFDCAD26E3E52-0200|urlb) within the requirements.md file. This indicates a verified connection to malicious infrastructure.
- [PROMPT_INJECTION] (LOW): The skill possesses a surface for Indirect Prompt Injection (Category 8) due to its auto-investigation of external data. 1. Ingestion points: Skill reads untrusted files in .aidocs/, docs/, requirements/, and STAKEHOLDERS.md as defined in SKILL.md. 2. Boundary markers: Absent; there are no delimiters or instructions to ignore embedded prompts in ingested data. 3. Capability inventory: The skill is granted Write, Edit, and Task tools, allowing for filesystem modification. 4. Sanitization: Absent; no validation logic is applied to text processed during requirements extraction.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata