kata-debug
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes several local shell commands to manage its state and retrieve configurations. Specifically, it uses
findto locate active debug sessions,nodeto execute a local library script (scripts/kata-lib.cjs), andgitfor automated commits after a bug is resolved. These operations are core to the skill's functionality but involve interaction with the host environment. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8). It accepts user-provided bug descriptions and symptoms via
$ARGUMENTSand subsequent questions, which are then interpolated into the prompt of a dynamically spawned subagent. While the subagent's prompt uses XML-style tags (<symptoms>,<agent-instructions>) as boundaries, there is no explicit sanitization of the user input or a robust instruction to the subagent to ignore any malicious instructions that might be embedded within the symptom reports. - Ingestion points: User input enters via
$ARGUMENTSinSKILL.mdand subsequentAskUserQuestioncalls. - Boundary markers: Uses
<symptoms>and<agent-instructions>tags to encapsulate data. - Capability inventory: Subagents are granted the ability to read project files, form and test hypotheses, and execute shell/Git commands via the orchestrator's framework.
- Sanitization: No evidence of input sanitization or filtering was found before interpolation into the subagent prompt.
Audit Metadata