pricing-test
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local script
audience-simulator.pyusing dynamic arguments such as{id}and{slug}. - Evidence found in
SKILL.md:audience-simulator.py load-panel --panel-id {id},audience-simulator.py create-panel, andaudience-simulator.py test-pricing. - Risk: If the
{id}or other parameters are derived from unsanitized user input, it could lead to command injection or unauthorized execution patterns. - [DATA_EXFILTRATION]: The skill performs broad file system access within the user's home directory to retrieve brand profiles and CRM-grounded audience data.
- Evidence found in
SKILL.md: Reads from~/.claude-marketing/brands/,~/.claude-marketing/sops/, and utilizes CRM purchase history for grounding. - Risk: Unauthorized access or accidental exposure of sensitive business data (CRM records, brand strategy) to the agent context.
- [PROMPT_INJECTION]: The skill possesses a significant attack surface for indirect prompt injection by ingesting external data from CRM systems and brand profile files.
- Ingestion points: CRM purchase history,
profile.json, and_manifest.jsonfiles. - Boundary markers: None identified in the provided instructions to delimit or ignore embedded instructions in the ingested data.
- Capability inventory: Execution of
audience-simulator.pyand reading of multiple configuration files. - Sanitization: No explicit sanitization or validation of the external content is mentioned before it is processed by the agent.
Audit Metadata