fill-missing-exif
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill executes the
exiftoolbinary usingsubprocess.runwith a list of arguments, which is a secure practice that prevents shell injection. The skill relies on the presence ofexiftoolon the host system as a prerequisite. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface (Category 8).
- Ingestion points: The skill reads untrusted data from the filesystem, specifically file paths in
discover_stage.pyand EXIF/XMP/QuickTime metadata tags viaexiftoolinfilter_stage.py. - Boundary markers: Absent. The agent interface defined in
agents/openai.yamldoes not implement boundary markers or instructions to ignore embedded content in tool outputs. - Capability inventory: The skill possesses the capability to execute external processes via
subprocess.runinshell.pyand perform file system write operations (backups and metadata updates) inwrite_stage.py. - Sanitization: Absent. The script prints file names and metadata results directly to the standard output, which is then processed by the AI agent without any escaping or sanitization of potential malicious instructions embedded in metadata fields.
Audit Metadata