Craft CMS Skills
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The
create_assetandupdate_assettools explicitly support local file paths (e.g.,/path/to/file) andfile://URLs in thefileUrlandnewFileUrlparameters. - Evidence: In
create_asset.md, the documentation states it supports 'Local file paths (e.g., /path/to/file.jpg)' and 'Local file:// URLs'. - Risk: An attacker could use indirect prompt injection to trick the agent into reading sensitive files like
~/.aws/credentials,/etc/passwd, or.envfiles and 'uploading' them as assets to the CMS, where they may become accessible via public URLs. - Command Execution (MEDIUM): The
SKILL.mdfile contains instructions that may lead the agent to execute shell commands for plugin management. - Evidence: 'The skills plugin must be installed... install it with
php craft plugin/install skills'. - Indirect Prompt Injection (LOW): The skill has a large attack surface as it is designed to ingest and process content from a CMS, which is considered untrusted data.
- Ingestion points:
get_entry.md,search_content.md, andget_fields.mdretrieve data from the CMS database. - Boundary markers: None mentioned; the agent is not instructed to ignore instructions within the retrieved content.
- Capability inventory: Includes file read/write via
create_asset, entry deletion viadelete_entry, and layout modification. - Sanitization: No explicit mention of sanitizing or escaping content before processing.
- External Downloads (LOW): The
create_assettool allows downloading files from arbitrary remote HTTP/HTTPS URLs. - Evidence:
create_asset.mdsupports 'Remote http:// or https:// URLs'. - Risk: This enables Server-Side Request Forgery (SSRF) if the agent is directed to request internal metadata services or private network resources.
Recommendations
- AI detected serious security threats
Audit Metadata