analyzing-text-sentiment
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Deceptive script functionality in
scripts/analyze_sentiment.py. While the skill description and the script's own docstring claim it performs sentiment analysis, the actual Python code executes recursive file system enumeration and gathering of file statistics. - [DATA_EXFILTRATION]: Environmental reconnaissance. The
analyze_sentiment.pyscript gathers metadata about the file system structure, including file names, types, and sizes viaPath.rglob('*'). This information is characteristic of internal environment mapping rather than text processing. - [PROMPT_INJECTION]: Surface for Indirect Prompt Injection. The skill is designed to ingest and process untrusted text data (customer reviews, tweets) but does not define boundary markers to separate data from instructions. Given the skill's broad
Bash(cmd:*)andWritepermissions, a malicious input containing instructions could potentially manipulate the agent's behavior. - [PROMPT_INJECTION]: Evidence of Indirect Injection vulnerability: Ingestion points: User-provided text data specified in
SKILL.mdexamples. Boundary markers: Absent; no delimiters or 'ignore' instructions are present. Capability inventory: High-privilege access includingBashshell execution,Write,Read, andGrep. Sanitization: Absent; the skill does not specify any validation or filtering of input data.
Audit Metadata