automating-api-testing
Warn
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_test_suite.pycontains agenerate_scriptmethod that dynamically builds bash scripts and explicitly modifies their file permissions usingchmod 0o755to make them executable. This allows for the creation and execution of arbitrary system commands at runtime. - [PROMPT_INJECTION]: The skill is designed to ingest and parse untrusted external data, specifically OpenAPI and GraphQL specifications, as described in
SKILL.md(Instruction 1). This creates a surface for indirect prompt injection where malicious instructions embedded in a specification file could influence the agent's actions. - Ingestion points: External API specifications (OpenAPI YAML/JSON or GraphQL SDL) are loaded into the agent's context during the parsing phase.
- Boundary markers: No specific delimiters or instructions are provided to the agent to treat the specification data as untrusted or to ignore embedded instructions.
- Capability inventory: The skill is granted access to powerful tools including
Bash,Write,Edit, andGrep, which could be abused if the agent's instructions are overridden by malicious data. - Sanitization: The instructions do not define any sanitization, validation, or escaping procedures for the content extracted from the API specifications.
Audit Metadata