skill-scanner
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): Significant surface for Indirect Prompt Injection (Category 8).
- Ingestion points: The skill explicitly reads and processes
SKILL.md,scripts/, andreferences/files from untrusted third-party skills provided by the user in Phase 1, Phase 3, and Phase 6. - Boundary markers: While the
SKILL.mdprovides a 'False Positive Guide' and instructions to 'evaluate intent', it lacks programmatic boundary markers or strict delimiters to prevent the agent from obeying instructions embedded within the scanned content. - Capability inventory: The skill is granted
Bash,Read,Grep, andGlob. TheBashcapability allows for arbitrary command execution on the host system. - Sanitization: No programmatic sanitization or escaping of the untrusted skill content is described before the agent processes it.
- COMMAND_EXECUTION (MEDIUM): The skill requires the
Bashtool to execute its bundled analysis script. - Evidence:
SKILL.mdinstructs the use ofuv run ${CLAUDE_SKILL_ROOT}/scripts/scan_skill.py <skill-directory>. - Risk: The presence of
Bashcombined with the ingestion of untrusted data (Category 8) allows a successful injection attack to escalate to arbitrary code execution. - EXTERNAL_DOWNLOADS (LOW): The use of
uv runmay trigger the download of Python dependencies defined in the script metadata. - Evidence:
uv runis used in Phase 2. - Note: Without the contents of
scripts/scan_skill.py, the specific dependencies cannot be verified, butuvis a standard tool for managing reproducible environments.
Recommendations
- AI detected serious security threats
Audit Metadata