markdown-pro
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The
markdown_helper.pyutility script invokes the systemgitcommand to extract history. Evidence: Theget_git_commitsfunction usessubprocess.runwith an argument list. While this method is safer thanshell=True, it allows the execution of local binaries based on user-provided tags. - PROMPT_INJECTION (LOW): The skill possesses an indirect prompt injection surface because it processes untrusted external content (Markdown files and Git commit history) and provides the output to the agent. 1. Ingestion points:
scripts/markdown_helper.pyreads local files viaopen()and git history viasubprocess. 2. Boundary markers: No delimiters or instructions are used to separate untrusted content from the agent's primary instructions. 3. Capability inventory: The script can read any local file the agent has access to and execute thegitbinary. 4. Sanitization: No sanitization is performed on extracted headers or commit messages before they are returned to the caller. This could allow an attacker to embed malicious instructions in a document's header or a commit message to influence the agent's downstream behavior.
Audit Metadata