fuzzing-apis
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_payloads.pyprovides agenerate_scriptmethod that writes new shell scripts to disk and applieschmod 755to make them executable. This dynamic execution pattern allows the skill to generate and run arbitrary code within the environment. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it processes configuration data from
{baseDir}/config/and uses it to drive automated actions and report generation. - Ingestion points: Configuration data is loaded from files within the
{baseDir}/config/directory inSKILL.mdStep 1. - Boundary markers: No explicit delimiters or instructions are used to separate untrusted configuration data from the agent's internal instructions.
- Capability inventory: The skill is authorized to use
Bash(test:fuzz-*),Read,Write,Edit,Grep, andGlobtools. - Sanitization: There is no evidence of validation or sanitization of configuration inputs before they are used in script generation or bash execution.
Audit Metadata