wisdom-distiller
Warn
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Path Traversal risk in file writing. The
--out-dirand--namearguments are used inpath.resolvewithout sanitization insrc/index.ts. This allows a user or an agent influenced by malicious data to write files to arbitrary locations on the filesystem by using directory traversal sequences like../. - [PROMPT_INJECTION]: Indirect Prompt Injection surface. The skill processes mission artifacts (
task_*.json) andTASK_BOARD.md, which are untrusted data sources. Malicious content within these files can influence the generated logic pipeline, which is later executed by the logic engine. - Ingestion points: Files are read from
missionDir/evidence/task_*.jsonandmissionDir/TASK_BOARD.mdusingfs.readFileSyncandsafeReadFileinsrc/index.ts. - Boundary markers: No boundary markers or instructions are provided in the generated YAML to ensure the downstream engine ignores embedded instructions.
- Capability inventory: The skill utilizes
safeWriteFileto create logic configuration files and JSON backups. - Sanitization: The skill manually constructs YAML output via string concatenation of the
argsandskillfields from the source artifacts. There is no escaping or validation of these strings, allowing for structural injection or property overriding in the output YAML.
Audit Metadata