faion-backend-developer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill analyzes untrusted local files to determine the project's backend stack, creating a significant attack surface.
- Ingestion points: The skill uses
GlobandGrepto read content from files such asgo.mod,Cargo.toml,pom.xml, and others. Specifically, the commandGrep("postgres|mysql|mongodb", "**/*")scans all files in the directory for database strings. - Capability inventory: The skill is granted
Bash,Write,Edit, andSkilltools, enabling it to execute arbitrary shell commands and modify the file system. - Boundary markers: No boundary markers or delimiters are defined to separate the data being read from the instructions the agent should follow.
- Sanitization: There is no evidence of sanitization or logic to prevent instructions embedded within scanned files from overriding the agent's system prompt or behavior.
- [Command Execution] (HIGH): The inclusion of the
Bashtool inallowed-toolsis a high-risk capability. When combined with the skill's behavior of scanning untrusted files, it facilitates potential Remote Code Execution (RCE) if an attacker successfully injects instructions into the project codebase that the agent subsequently executes via the shell.
Recommendations
- AI detected serious security threats
Audit Metadata