paseo-chat
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to the way it processes external and user-supplied data.
- Ingestion points: The
SKILL.mdfile interpolates the$ARGUMENTSvariable directly into the instruction context. Furthermore, thepaseo chat readcommand (referenced inSKILL.md) ingests messages from a shared chat environment. - Boundary markers: There are no delimiters, such as XML tags or markdown blocks, or specific instructions for the agent to ignore embedded commands within the interpolated arguments or chat outputs.
- Capability inventory: The agent has the capability to execute shell commands via the
paseoCLI tool. - Sanitization: No sanitization, escaping, or validation mechanisms are defined for the ingested chat content or user arguments.
- [DATA_EXFILTRATION]: The skill documents the use of
paseo chat postto send information to an external chat service. While this is the intended functionality for coordination, it creates a risk where a compromised or manipulated agent could be instructed to post sensitive environment variables, secrets, or internal file contents into a shared room.
Audit Metadata