mkdocs-config-generator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is explicitly designed to process technical documentation (untrusted data) and has permissions to execute
Bashcommands and write to files. If an adversary embeds malicious instructions in the documentation files being processed (e.g., within markdown comments or metadata), the agent could be coerced into executing arbitrary commands or exfiltrating data. - Ingestion points: Uses
ReadandGrepto access local file content (Markdown files, existing MkDocs configurations). - Boundary markers: There are no specified delimiters or instructions to ignore embedded commands within the processed files.
- Capability inventory:
Read,Write,Edit,Bash,Grep. The presence ofBashandWriteprovides a direct path from injection to system impact. - Sanitization: No evidence of sanitization, validation, or safety-wrapping for data retrieved from the filesystem.
- [Command Execution] (MEDIUM): The inclusion of the
Bashtool inallowed-toolsprovides a powerful mechanism for system interaction. Given the skill's auto-activation on keywords related to documentation, an attacker could potentially trigger the skill and control the resulting shell commands by providing malformed or malicious documentation content.
Recommendations
- AI detected serious security threats
Audit Metadata