bio-annotation
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The documentation in
docs/interproscan-usage.mdsuggests installing Nextflow usingcurl -s https://get.nextflow.io | bash. This pattern of piping remote content directly to a shell is a critical security vulnerability allowing arbitrary code execution. The severity is high given its inclusion as a recommended installation path.\n- EXTERNAL_DOWNLOADS (MEDIUM): Multiple tool guides (docs/diamond-usage.md,docs/interproscan-usage.md,docs/taxonkit-usage.md) direct users to download binary archives from GitHub and FTP servers without integrity verification (e.g., SHA-256 checksums). While these are common bio-informatics sources, they are not on the predefined trusted list. Severity is downgraded from HIGH as these downloads are necessary for the skill's primary function.\n- COMMAND_EXECUTION (MEDIUM): The skill utilizes Docker (docs/interproscan-usage.md) and complex shell script executions (interproscan.sh,emapper.py). Running Docker profiles can involve elevated privileges, and subprocess calls on user-provided input files present a risk of command injection.\n- PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) due to its processing of external sequence data.\n - Ingestion points:
proteins.faa(specified inSKILL.md).\n - Boundary markers: Absent; no delimiters or warnings for the agent to ignore instructions within the FASTA file.\n
- Capability inventory:
interproscan.sh,emapper.py,diamond, andtaxonkitare executed as subprocesses across multiple documents.\n - Sanitization: Absent; the skill only verifies that the file is non-empty and amino-acid encoded, which does not prevent malicious content in sequence headers.
Recommendations
- AI detected serious security threats
Audit Metadata