ai-automation-workflows
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection vulnerability surface identified in several automation templates.
- Ingestion points: The
data_processing.shtemplate reads raw file content usingcat,conditional_workflow.shprocesses positional CLI arguments, andcontent_pipeline.shchains outputs from one model into the next. - Boundary markers: None; the content is placed directly into the prompt strings.
- Capability inventory: The skill uses the
infshCLI tool to interact with various models and tools, including web search (tavily/search-assistant). - Sanitization: The templates do not include logic for escaping or validating external content before it is processed by the AI models.
- [COMMAND_EXECUTION]: The skill is centered around the creation and execution of shell and Python scripts to automate tasks. It utilizes
subprocess.runin Python and direct bash execution to manage theinfshCLI tool and local files. - [EXTERNAL_DOWNLOADS]: The skill's documentation includes instructions to download additional components from the author's own ecosystem (e.g.,
npx skills add inference-sh/skills@agent-tools). These are recognized as legitimate vendor resources from the skill author.
Audit Metadata