chunking-strategy
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
references/implementation.mdfile contains code for aChunkingCachethat usespickle.loads()to deserialize data. This is a security risk if the cache data (e.g., from a Redis instance) is compromised, aspicklecan be used to execute arbitrary code during deserialization. - [COMMAND_EXECUTION]: The skill instructions specify the use of
BashandWritetools and provide Python examples that perform system-level tasks such as memory monitoring (psutil) and distributed execution (ray,dask). - [EXTERNAL_DOWNLOADS]: The
references/tools.mdandreferences/evaluation.mdfiles provide instructions to install well-known libraries likelangchainand download models from Hugging Face. These are from trusted sources and well-known technology providers. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted text from documents for chunking while maintaining access to powerful system tools. It lacks explicit boundary markers or input sanitization to prevent malicious instructions hidden in documents from being interpreted as commands by the agent.
Audit Metadata