simulation-orchestrator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill creates a high-severity vulnerability surface for indirect prompt injection. Ingestion points: The
result_aggregator.pyscript (lines 134-145) reads and parses external JSON result files to extract user-specified metrics. Boundary markers: Absent. The skill does not implement delimiters or 'ignore embedded instruction' warnings when processing this external content. Capability inventory: The agent is explicitly grantedBash,Write,Read,Grep, andGlobtools in theSKILL.mdfile. Sanitization: There is no evidence of validation or sanitization of the metric values extracted from external files. This configuration allows an attacker to embed malicious instructions in simulation outputs that the agent may subsequently execute using its available tools. - [COMMAND_EXECUTION] (MEDIUM): The
campaign_manager.pyscript (lines 80-87) dynamically constructs shell command strings by interpolating paths into a user-provided template. While the internal path generation is currently constrained, the overall design encourages the agent to execute dynamically generated strings in aBashenvironment, which is inherently dangerous when the agent is also processing untrusted external data.
Recommendations
- AI detected serious security threats
Audit Metadata