tool-design
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The documentation in
references/architectural_reduction.mdexplicitly provides a pattern for anexecute_commandtool that runs arbitrary bash commands usingsandbox.exec(command). This gives the agent a direct shell interface, which is a high-risk capability that can be abused through prompt injection. - [COMMAND_EXECUTION] (MEDIUM): The skill promotes using powerful Unix primitives like
grep,cat, andfindto access and parse sensitive data layer definitions, which increases the likelihood of unauthorized data exposure if sandbox boundaries are misconfigured. - [PROMPT_INJECTION] (LOW): The
scripts/description_generator.pyscript is susceptible to indirect prompt injection (Category 8) when processing external tool specifications. \n - Ingestion points:
tool_specobject ingenerate_tool_descriptionfunction. \n - Boundary markers: Absent; descriptions and parameters are interpolated directly into markdown templates. \n
- Capability inventory: Arbitrary bash execution (as suggested in documentation) and SQL execution. \n
- Sanitization: No validation or escaping is performed on
tool_specfields before generation.
Recommendations
- AI detected serious security threats
Audit Metadata