dotnet-aot-analysis
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is highly vulnerable to indirect prompt injection from untrusted project files.
- Ingestion points: The skill uses
Read,Glob, andGrepto inspect project files (.csproj,Directory.Build.props) and source code to identify project types and compatibility (Steps 2 and 6). - Boundary markers: No boundary markers or 'ignore' instructions are used to separate the analyzed project data from the agent's logic.
- Capability inventory: The skill can modify project configuration files (Steps 5 and 6) and executes
dotnet buildvia the Bash tool (Step 7). - Sanitization: There is no evidence of sanitization for the project content being read. An attacker could embed instructions in a project's metadata or comments to trick the agent into performing unauthorized actions.
- COMMAND_EXECUTION (MEDIUM): The skill invokes the
dotnet buildcommand on the user's project. While this is a standard operation, if the project files have been maliciously modified (via the injection path mentioned above or pre-existing malicious MSBuild targets), this can lead to arbitrary code execution on the user's machine. - EXTERNAL_DOWNLOADS (LOW): The skill references sub-skills like
dotnet-source-gen-jsonand documentation fromlearn.microsoft.com. While the documentation links are to a trusted source, the repository for the skill itself (https://github.com/im5tu/dotnet-skills) is not in the trusted sources list.
Recommendations
- AI detected serious security threats
Audit Metadata