detecting-memory-leaks
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_report.pycontains agenerate_scriptmethod that constructs shell scripts from thecontentargument and explicitly sets executable permissions viachmod 0o755. This enables the creation of arbitrary executable files on the host system based on user or agent-provided input.\n- [PROMPT_INJECTION]: The skill analyzes external code files from{baseDir}/without implementing boundary markers or instructions to disregard embedded commands, making it susceptible to indirect prompt injection.\n - Ingestion points: Reads source code files for analysis as specified in
SKILL.md.\n - Boundary markers: Absent. No delimiters or directives are used to separate untrusted code from instructions.\n
- Capability inventory: The skill has access to
Bashtools and the ability to generate executable scripts usingscripts/generate_report.py.\n - Sanitization: Absent. Content from analyzed files is used directly without validation or filtering.\n- [COMMAND_EXECUTION]: The
SKILL.mdfile defines broadBashtool permissions using wildcards (profiling:*andmemory:*). This expansive access, combined with the ability to generate new executable scripts, provides a significant attack surface if the agent is manipulated.
Audit Metadata