agent-factory
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through its worker creation logic.
- Ingestion points: The
taskdictionary inSKILL.md(specifically theid,name,acceptance, andtask_instructionsfields) acts as an entry point for untrusted data. - Boundary markers: Absent. Untrusted content is substituted directly into placeholders like
{task_instructions}and{acceptance}within the generatedworker_skillanddispatch_promptwithout using delimiters or instructions to ignore embedded commands. - Capability inventory: The skill utilizes
write_fileto create new skill definitions,os.makedirsfor directory management, and theTasktool to execute subagents with the generated prompts inSKILL.md. - Sanitization: Absent. There is no escaping or validation of task-provided strings before they are interpolated into executable instructions or system prompts.
- [COMMAND_EXECUTION]: The skill performs dynamic script generation and file system operations based on external input.
- The
create_worker_agentfunction programmatically generatesSKILL.mdfiles for worker agents, which are subsequently executed via theTasktool. - The construction of the
worker_skill_pathinSKILL.mdincorporates thetask['id']value directly into a file path (.claude/skills/workers/{worker_id}/SKILL.md). Without proper sanitization, this allows for potential path traversal, enabling the writing of skill files to unauthorized locations if the task ID contains directory traversal sequences.
Audit Metadata