model-quantization-tool

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONNO_CODE
Full Analysis
  • [Indirect Prompt Injection] (HIGH): The skill possesses a high-risk attack surface due to its combination of untrusted data processing and powerful capabilities.\n
  • Ingestion points: Processes user requests and potentially model files via 'Read' and 'Grep' tools (SKILL.md).\n
  • Boundary markers: No delimiters or instructions to ignore embedded commands are present.\n
  • Capability inventory: Requests access to 'Bash', 'Write', and 'Edit', allowing for system command execution and file modification.\n
  • Sanitization: No input validation or sanitization is provided.\n- [Metadata Poisoning] (LOW): Redundant trigger phrases are present in the YAML metadata (Triggers on: model quantization tool, model quantization tool). This is a minor best-practice violation.\n- [No Code] (INFO): No scripts or binaries were found in the skill; it relies entirely on Markdown instructions for the agent.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:10 PM