prompt-test
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes Python scripts via the shell using string interpolation for user-provided variables (e.g.,
python scripts/prompt-ab-tester.py --test-name "{name}"). If a user provides an input such asmytest"; touch /tmp/pwned; ", it would result in arbitrary command execution on the local system. - [DATA_EXFILTRATION]: The skill systematically accesses files in the
~/.claude-marketing/directory, includingprofile.json,_active-brand.json, andguidelines/_manifest.json. This exposes proprietary brand data, messaging hierarchies, and agency SOPs to the agent context. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted content provided by the user.
- Ingestion points: The
content_or_pathandevidence_filevariables inSKILL.mdare used to feed external data into the evaluation process. - Boundary markers: None are present; there are no instructions to the agent to disregard instructions embedded within the content being tested.
- Capability inventory: The skill performs subprocess calls to
scripts/eval-runner.pyandscripts/prompt-ab-tester.pyand utilizes thequality-assuranceandcontent-creatoragents to process the data. - Sanitization: No sanitization or escaping of the input content is described before it is passed to the scripts or agents.
Recommendations
- AI detected serious security threats
Audit Metadata