chunking-strategy

Warn

Audited by Gen Agent Trust Hub on Mar 24, 2026

Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The references/implementation.md file contains code for a ChunkingCache that uses pickle.loads() to deserialize data. This is a security risk if the cache data (e.g., from a Redis instance) is compromised, as pickle can be used to execute arbitrary code during deserialization.
  • [COMMAND_EXECUTION]: The skill instructions specify the use of Bash and Write tools and provide Python examples that perform system-level tasks such as memory monitoring (psutil) and distributed execution (ray, dask).
  • [EXTERNAL_DOWNLOADS]: The references/tools.md and references/evaluation.md files provide instructions to install well-known libraries like langchain and download models from Hugging Face. These are from trusted sources and well-known technology providers.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted text from documents for chunking while maintaining access to powerful system tools. It lacks explicit boundary markers or input sanitization to prevent malicious instructions hidden in documents from being interpreted as commands by the agent.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 24, 2026, 11:08 PM