skills/jeremylongshore/claude-code-plugins-plus-skills/configuring-load-balancers/Gen Agent Trust Hub
configuring-load-balancers
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/generate_config.pyscript features agenerate_scriptfunction that accepts content from the--contentcommand-line argument and writes it directly to a.shfile. The function subsequently applies execution permissions (chmod 0o755) to the file. This allows for the dynamic creation and possible execution of arbitrary shell scripts based on unvalidated input.\n- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it processes external data to generate configuration files and scripts without proper isolation or validation.\n - Ingestion points: Input enters via the
--content,--title, and--configarguments inscripts/generate_config.py.\n - Boundary markers: No delimiters or instructions are used to distinguish user-provided content from the generated script or configuration templates.\n
- Capability inventory: The skill is authorized to use powerful tools, including
Bashwithaws,gcloud, andnginxscopes, along with file system read and write permissions.\n - Sanitization: There is no evidence of input validation or sanitization before the data is written to executable files.
Audit Metadata