chunking-strategy
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
ChunkingCacheimplementation inreferences/implementation.mdusespickle.loads()to retrieve data from a Redis instance or local cache. Usingpicklefor deserialization is inherently insecure as it can be exploited to execute arbitrary code if an attacker manages to modify the stored cache data. - [PROMPT_INJECTION]: The skill is designed to process untrusted external documents for Retrieval-Augmented Generation (RAG). The provided pre-processing pipeline in
references/implementation.mdand strategies inreferences/semantic-methods.mdlack explicit sanitization or defensive boundary markers for handling these documents. This establishes a surface for indirect prompt injection when processed chunks are subsequently used as context for an LLM. Ingestion points:references/implementation.md(DocumentAnalyzer.analyze). Boundary markers: Not implemented in the provided logic. Capability inventory: The skill metadata requestsBash,Write, andReadpermissions. Sanitization: Absent from processing logic.
Audit Metadata