prompt-engineering
Pass
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill implements a framework for building prompts by interpolating variables, which creates a surface for indirect prompt injection if user-controlled data is used without care.
- Ingestion points: Found in
references/template-systems.mdwithin therendermethod of theTemplateEngineand in various templates inreferences/few-shot-patterns.md(e.g.,{input_text},{inquiry_text}). - Boundary markers: The skill's design guidelines in
references/system-prompt-design.mdsuggest using XML tags (<tag>), markdown headers (###), and thinking blocks (<thinking>) to delimit data from instructions. - Capability inventory: The skill has access to
Read,Write,Edit,Glob,Grep, andBashtools. - Sanitization: The documentation in
references/template-systems.mdspecifically identifies 'Input Validation: Sanitize all template variables' as a best practice to prevent injection. - [COMMAND_EXECUTION]: Several files contain Python utility scripts for dynamic template rendering and performance analysis.
- Evidence:
references/template-systems.mdprovides aTemplateEngineclass for runtime string interpolation and conditional logic.references/optimization-frameworks.mdincludes scripts for calculating success rates, token efficiency, and statistical significance using NumPy and SciPy libraries.
Audit Metadata