tw-edu-differentiated
Pass
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute a local Python script (scripts/generate_differentiated.py) that processes teacher inputs and generates Word documents using thepython-docxlibrary. - [PROMPT_INJECTION]: User-provided inputs such as the subject, lesson title, grade, and student needs are interpolated directly into a shell command string and a file output path. This creates an attack surface for indirect prompt injection, command injection, and path traversal if the inputs contain malicious shell characters or path sequences. Mandatory Evidence Chain (Category 8): 1. Ingestion points: User inputs collected during Step 1 in
SKILL.md. 2. Boundary markers: Absent in the bash command template. 3. Capability inventory:Bashtool for script execution andWritetool for document generation. 4. Sanitization: None visible in the provided instructions. - [SAFE]: The skill reads several context files from parent directories (
../../tw_edu_...) and absolute paths (/mnt/skills/public/docx/SKILL.md). These appear to be part of the vendor's (FW1201) shared educational framework and are documented as necessary configuration.
Audit Metadata