backlog-tools-administrator
Fail
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill implements a workflow where the agent modifies Python source files (e.g.,
operations.py,server.py,backlog.py) and then executes them viauv runandpytest. This dynamic modification and execution of code, driven by user-provided descriptions in$ARGUMENTS, creates a risk of arbitrary code execution. - [COMMAND_EXECUTION]: The skill executes shell commands using
uv runto perform linting (prek run) and testing (pytest). These commands operate on files that the agent is instructed to modify during the workflow. The toolprekis not a standard or well-known development package. - [PROMPT_INJECTION]: Indirect Prompt Injection Surface:
- Ingestion points: User input is ingested via the
<gap_description>tag inSKILL.mdusing the$ARGUMENTSplaceholder. - Boundary markers: The input is structurally contained within
<gap_description>tags, providing minimal separation from instructions. - Capability inventory: The skill can modify project scripts across the domain registry, execute shell commands, and update documentation and rules.
- Sanitization: No input validation or sanitization is performed before the user-provided description is used to guide automated code modification.
Recommendations
- AI detected serious security threats
Audit Metadata