skills/jeremylongshore/claude-code-plugins-plus-skills/generating-compliance-reports/Gen Agent Trust Hub
generating-compliance-reports
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/generate_report.pyutility constructs executable Bash scripts from arbitrary string input. - Evidence: The
generate_scriptmethod takes atemplateargument and writes it to a.shfile. - [COMMAND_EXECUTION]: The skill programmatically grants execution privileges to dynamically created files.
- Evidence: In
scripts/generate_report.py,file_path.chmod(0o755)is called on generated scripts. - [EXTERNAL_DOWNLOADS]: The skill documentation describes a mechanism for remote data retrieval from unverified sources.
- Evidence:
scripts/README.mdreferencesfetch_standards.pyfor fetching compliance standards from online sources. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by processing unsanitized data for report and script generation.
- Ingestion points: System data and user inputs processed by
generate_report.pyvia the--contentand--configarguments. - Boundary markers: Absent in the generation logic.
- Capability inventory: Extensive use of
Write,Edit, andBashtools enabled in the skill frontmatter. - Sanitization: No sanitization or validation of input data is performed before interpolation into scripts.
Audit Metadata