discord-bot-architect
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Dynamic Execution] (MEDIUM): The skill implements dynamic module loading for both JavaScript and Python bot templates. Evidence in
src/index.js:require(filePath)is used within a loop over local files. Evidence inmain.py:bot.load_extension()is used to load modules based on directory listings. While standard for bot architectures, this facilitates execution of any code placed in these directories. - [Indirect Prompt Injection] (MEDIUM): The skill creates a vulnerability surface by processing untrusted data from external Discord users. 1. Ingestion points:
interaction(JS) andctx,user, andmessage(Python) parameters insrc/commands/ping.jsandmain.py. 2. Boundary markers: Absent; user input is not delimited or flagged as untrusted. 3. Capability inventory: The examples demonstrate messaging (interaction.reply,ctx.respond) and local file discovery/loading. 4. Sanitization: Absent; thegreetcommand inmain.pydirectly interpolates the untrustedmessagestring into the bot's response.
Audit Metadata