model-quantization-tool
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONNO_CODE
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill possesses a high-risk attack surface due to its combination of untrusted data processing and powerful capabilities.\n
- Ingestion points: Processes user requests and potentially model files via 'Read' and 'Grep' tools (SKILL.md).\n
- Boundary markers: No delimiters or instructions to ignore embedded commands are present.\n
- Capability inventory: Requests access to 'Bash', 'Write', and 'Edit', allowing for system command execution and file modification.\n
- Sanitization: No input validation or sanitization is provided.\n- [Metadata Poisoning] (LOW): Redundant trigger phrases are present in the YAML metadata (Triggers on: model quantization tool, model quantization tool). This is a minor best-practice violation.\n- [No Code] (INFO): No scripts or binaries were found in the skill; it relies entirely on Markdown instructions for the agent.
Recommendations
- AI detected serious security threats
Audit Metadata