tech-news
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [Dynamic Execution] (MEDIUM): The skill employs dynamic loading techniques to integrate with external components.
- Evidence:
scripts/process_images.pymodifiessys.pathand imports modules based on environment variables (R2_UPLOAD_SKILL_DIR) or relative directory paths computed at runtime. - Evidence: Documentation in
references/SOURCES.mdprovides an example for a plugin system that utilizesimportlibandexec_moduleto execute arbitrary Python files from a specific directory. - [Indirect Prompt Injection] (LOW): The skill is susceptible to indirect prompt injection because it interpolates untrusted data from external news sources into LLM prompts without sanitization or boundary markers.
- Ingestion points: News titles and descriptions are fetched from various external sources (e.g., Hacker News, Reddit) and processed in
scripts/llm_translate.py. - Boundary markers: Absent. The
user_textis constructed by simple string concatenation of source name, title, and description. - Capability inventory: The skill utilizes
urllib.requestfor network access and performs local file writing/updates viascripts/process_images.py. - Sanitization: Absent. No escaping or structural validation is performed on article content before it is passed to the translation LLM.
- [Data Exposure & Exfiltration] (LOW): The skill manages sensitive API keys via environment variables and references local configuration paths.
- Evidence: The skill requires
MINIMAX_API_KEYorOPENAI_API_KEYand contains instructions inSKILL.mdandreferences/WORKFLOW.mdregarding the use of~/.r2-upload.ymlfor storage configuration. - [Unverifiable Dependencies & Remote Code Execution] (LOW): The skill references external dependencies in its documentation and Docker configurations.
- Evidence:
references/EXAMPLES.mdand the provided Dockerfile specify the installation of thepyyamlpackage.
Audit Metadata