docs-seeker
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (MEDIUM): The skill instructions include running
npm install -g repomixat runtime in Phase 3. This installs an external package from the public NPM registry, which is an unverifiable dependency installation at the time of execution.\n- COMMAND_EXECUTION (MEDIUM): The skill executes multiple shell commands includinggit clone,cd, andrepomix. These commands operate on repository URLs and file paths obtained through web searches, which could be manipulated to execute unauthorized commands if the search results are poisoned.\n- EXTERNAL_DOWNLOADS (MEDIUM): The skill is designed to download content fromcontext7.com(an external documentation aggregator) and clone repositories from GitHub into a temporary directory (/tmp/docs-analysis).\n- PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8). It ingests content from external repositories and documentation files (llms.txt) and processes them through multiple agent tasks without sanitization. Mandatory Evidence Chain:\n - Ingestion points:
WebFetchfor llms.txt files andgit clonefor entire repositories.\n - Boundary markers: Absent; the skill does not define delimiters or warnings to ignore instructions within the ingested content.\n
- Capability inventory: The skill has the capability to execute shell commands (
npm,git,repomix), read files, and spawn multiple sub-agents.\n - Sanitization: None; external content is used directly for analysis.
Audit Metadata