lorem-ipsum
Warn
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill executes a local Python script (
scripts/generate.py) using theuvrunner. While the script is intended for text generation, it includes a--outputflag that permits writing to the file system. - Evidence: Instructions and examples such as
uv run scripts/generate.py --output ~/Desktop/placeholder.txtdemonstrate direct file system write capabilities. - Risk: An attacker could use indirect prompt injection to trick the agent into using a sensitive file path (e.g.,
~/.bashrc,~/.ssh/config) as the output target. While the content written is likely benign lorem ipsum, overwriting these files would result in data loss or system misconfiguration. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a 'Write' capability based on user-provided parameters.
- Ingestion points: User instructions via the agent (e.g., file path for
--output). - Boundary markers: None specified in the workflow for the
--outputparameter. - Capability inventory: File writing (
--outputflag). - Sanitization: No evidence of path validation or sanitization to prevent writing to restricted system directories.
Audit Metadata