competitor-teardown
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses the
infshCLI to perform market research tasks, including running search assistants (tavily/search-assistant,exa/search) and browser tools (infsh/agent-browser).\n- [REMOTE_CODE_EXECUTION]: Utilizes a hostedpython-executorto run scripts for data visualization. Example code uses thematplotliblibrary to generate positioning maps.\n- [EXTERNAL_DOWNLOADS]: References installation instructions and supplementary skill modules hosted on the vendor's official GitHub repository (github.com/inference-sh).\n- [PROMPT_INJECTION]: Identified an indirect prompt injection surface inherent to web research tools.\n - Ingestion points: External content from competitor websites and search engine results (via
agent-browser,tavily, andexa).\n - Boundary markers: No explicit delimiters or warnings provided to the agent regarding external data content.\n
- Capability inventory: Access to shell commands via the
infshCLI, web browsing, and dynamic code execution viapython-executor.\n - Sanitization: No visible sanitization or filtering of external content prior to processing.
Audit Metadata