ptc-orchestration
Warn
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill is designed to enable the
code_execution_20250825tool, which allows the agent to write and run Python code for tool orchestration. This dynamic execution capability is a high-privilege feature that could be exploited if the generated code logic is influenced by malicious input. - EXTERNAL_DOWNLOADS (LOW): The setup instructions direct the user to install the
ptc_wrapperpackage from a local path usinguv pip install -e .. This assumes the user has already obtained the source code from an external source. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection as it performs multi-URL scraping and browser automation. Malicious instructions embedded in target web pages could influence the code generated by the agent for orchestration.
- Ingestion points: Content from scraped URLs and browser action snapshots.
- Boundary markers: None present in the skill definition to separate untrusted web content from the orchestration instructions.
- Capability inventory:
code_execution,flaresolverr(MCP), andbrowsermcp(MCP) which provide browser and network access. - Sanitization: No evidence of sanitization or filtering of external data before it is processed by the orchestration logic.
Audit Metadata