planning-with-files
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes automated hooks to execute shell commands and PowerShell scripts during the agent lifecycle.
- [COMMAND_EXECUTION]: The
Stophook executes a PowerShell script using the-ExecutionPolicy Bypassflag. This technique is designed to circumvent system security policies that would otherwise prevent the execution of scripts. Evidence:powershell.exe -NoProfile -ExecutionPolicy Bypass -File "$SD/check-complete.ps1". - [PROMPT_INJECTION]: The skill implements a
PreToolUsehook that automatically injects content fromtask_plan.mdinto the agent's context window before every tool call, creating a recurring surface for indirect prompt injection. - Ingestion points: Content is read from
task_plan.mdand injected into the conversation via thePreToolUsehook in SKILL.md. - Boundary markers: The injection mechanism lacks delimiters or specific instructions to treat the file content as untrusted data.
- Capability inventory: The skill allows the use of powerful tools including
Bash,Write,Edit, andRead. - Sanitization: No sanitization, validation, or escaping is applied to the file content before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata