simulate
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The process involves executing a local script
revenue-simulator.pyusing parameters derived from user-provided marketing scenarios. This represents a dynamic command execution surface where inputs are interpolated into a subprocess call. - [DATA_EXFILTRATION]: The skill accesses sensitive brand-related data and performance history located in the user's home directory at
~/.claude-marketing/. This includes brand profiles, SOPs, and marketing guidelines which may contain proprietary business information. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from user-defined scenarios and local files to drive its logic.
- Ingestion points: User-provided 'Scenarios to simulate' and brand data files (e.g.,
profile.json). - Boundary markers: None present; the skill lacks delimiters or instructions to ignore embedded commands in the scenario descriptions.
- Capability inventory: The skill has the capability to execute a Python script (
revenue-simulator.py) using the ingested data. - Sanitization: No evidence of input validation or sanitization for the scenario parameters before they are passed to the simulation script.
Audit Metadata