developing-genkit-python
Fail
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Persistence mechanism detected in
references/dev-workflow.md, where the skill instructs users to appendexportcommands to their shell profile (~/.zshrc). This modifies system configuration to maintain environment state across sessions.- [REMOTE_CODE_EXECUTION]: The skill recommends installing theuvdependency manager by downloading and executing a shell script fromhttps://astral.sh/uv/install.shvia a pipe tosh.- [PROMPT_INJECTION]: Indirect prompt injection surface identified. The skill demonstrates flows and tools (e.g.,summarizeandget_weatherinreferences/examples.md) that ingest untrusted user data via Pydantic models and interpolate it into model prompts without sanitization. Evidence Chain: 1. Ingestion points:SummarizeInput.textandWeatherInput.city(referenced inreferences/examples.md). 2. Boundary markers: Absent in provided examples. 3. Capability inventory: Ability to call models viaai.generateand execute local code viauv runin thegenkit startworkflow. 4. Sanitization: Absent in the code patterns.
Recommendations
- AI detected serious security threats
Audit Metadata