simulate

Warn

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The process involves executing a local script revenue-simulator.py using parameters derived from user-provided marketing scenarios. This represents a dynamic command execution surface where inputs are interpolated into a subprocess call.
  • [DATA_EXFILTRATION]: The skill accesses sensitive brand-related data and performance history located in the user's home directory at ~/.claude-marketing/. This includes brand profiles, SOPs, and marketing guidelines which may contain proprietary business information.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from user-defined scenarios and local files to drive its logic.
  • Ingestion points: User-provided 'Scenarios to simulate' and brand data files (e.g., profile.json).
  • Boundary markers: None present; the skill lacks delimiters or instructions to ignore embedded commands in the scenario descriptions.
  • Capability inventory: The skill has the capability to execute a Python script (revenue-simulator.py) using the ingested data.
  • Sanitization: No evidence of input validation or sanitization for the scenario parameters before they are passed to the simulation script.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 27, 2026, 01:03 PM