refactor-skill
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses
uvx skilllint@latestto download and execute theskilllintpackage at runtime. Executing unverified packages from a remote registry without version pinning allows for potential arbitrary code execution. - [COMMAND_EXECUTION]: The skill performs shell commands including
uvxandgrepto analyze and validate skills. This involves running commands with arguments derived from user input or file content. - [EXTERNAL_DOWNLOADS]: The use of
uvxtriggers downloads from the Python Package Index (PyPI) to fetch theskilllintutility at execution time. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes the full content of external
SKILL.mdand reference files. These files could contain malicious instructions designed to subvert the refactoring process or inject payloads into the newly created skills. - Ingestion points: Reads all lines of the target
SKILL.mdand all files in itsreferences/subdirectory (Phase 1). - Boundary markers: The instructions do not define delimiters or specific 'ignore embedded instructions' warnings for the ingested content.
- Capability inventory: The skill has the ability to read, write, and move files, as well as execute shell commands (
uvx,grep). - Sanitization: There is no mention of sanitizing or validating the content extracted from external files before it is used to generate new skill definitions or written back to the file system.
Audit Metadata