skills/gsd-build/gsd-2/create-skill/Gen Agent Trust Hub

create-skill

Fail

Audited by Gen Agent Trust Hub on Mar 22, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The 'verify-skill.md' workflow extracts CLI tool names from other skill files and executes them using 'which {tool}' and '{tool} --version'. This presents a command injection vulnerability because the tool names are derived from untrusted source data and are not sanitized before being incorporated into shell commands.
  • [COMMAND_EXECUTION]: The 'references/api-security.md' file provides implementation examples for a credential wrapper script that uses 'eval' on variables built from user-supplied service and profile names. This pattern is inherently dangerous and can lead to arbitrary command execution if the input parameters contain shell metacharacters.
  • [EXTERNAL_DOWNLOADS]: The skill documentation encourages the installation of various third-party software packages from public registries like PyPI and npm (e.g., 'pypdf', 'pdfplumber', 'docx-js', 'vercel') to support skill functionality.
  • [PROMPT_INJECTION]: The 'audit-skill.md' and 'verify-skill.md' workflows create an indirect prompt injection surface by reading and acting upon content from external, untrusted skill files. * Ingestion points: Ingests file content via 'cat' in 'workflows/audit-skill.md' and 'workflows/verify-skill.md'. * Boundary markers: None identified in the processing logic for analyzed files. * Capability inventory: Includes capabilities for file system access ('ls', 'cat'), script execution ('chmod +x'), and shell command execution ('which', '{tool} --version'). * Sanitization: No validation or sanitization is mentioned for data extracted from skills and used in subsequent operations.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 22, 2026, 11:49 AM