taskfiles
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill's core function is to define and run shell commands through the Taskfile format. Provided templates include execution of high-privilege tools such as
terragruntfor infrastructure provisioning andipmitoolfor hardware management.\n- [PROMPT_INJECTION] (HIGH): The skill presents a significant Indirect Prompt Injection surface (Category 8).\n - Ingestion points: The agent reads untrusted content from existing
Taskfile.yamlfiles, the.taskfiles/directory, andinfrastructure/inventory.hcl.\n - Boundary markers: Absent. There are no instructions to the agent to ignore or isolate instructions found within the data files it processes.\n
- Capability inventory: The agent has full capability to execute shell commands via the
taskCLI, write to the filesystem, and manage infrastructure.\n - Sanitization: Absent. The skill promotes the direct interpolation of
CLI_ARGSinto shell commands (e.g.,git worktree add ... -b "{{.NAME}}"), which is a classic command injection vulnerability.\n- [CREDENTIALS_UNSAFE] (LOW): Documentation inreferences/schema.mdexplicitly supports loading.envand.env.localfiles. While standard for the tool, this increases the risk of the agent accidentally exposing or misusing sensitive secrets during maintenance tasks.
Recommendations
- AI detected serious security threats
Audit Metadata