lorem-ipsum

Warn

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION] (MEDIUM): The skill executes a local Python script (scripts/generate.py) using the uv runner. While the script is intended for text generation, it includes a --output flag that permits writing to the file system.
  • Evidence: Instructions and examples such as uv run scripts/generate.py --output ~/Desktop/placeholder.txt demonstrate direct file system write capabilities.
  • Risk: An attacker could use indirect prompt injection to trick the agent into using a sensitive file path (e.g., ~/.bashrc, ~/.ssh/config) as the output target. While the content written is likely benign lorem ipsum, overwriting these files would result in data loss or system misconfiguration.
  • [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a 'Write' capability based on user-provided parameters.
  • Ingestion points: User instructions via the agent (e.g., file path for --output).
  • Boundary markers: None specified in the workflow for the --output parameter.
  • Capability inventory: File writing (--output flag).
  • Sanitization: No evidence of path validation or sanitization to prevent writing to restricted system directories.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 10:10 PM