skills/jeremylongshore/claude-code-plugins-plus-skills/running-clustering-algorithms/Gen Agent Trust Hub
running-clustering-algorithms
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface because it processes untrusted external data (such as CSV or JSON datasets) to determine its execution parameters and generated analysis code. The absence of explicit boundary markers or sanitization logic increases the risk that malicious instructions embedded within the data could be interpreted by the agent.
- Ingestion points: The skill reads external datasets through the
scripts/data_loader.pyutility and instructions inSKILL.mdthat guide the agent to load files likecustomer_data.csv. - Boundary markers: No markers (such as XML tags or clear delimiters) are specified in the prompts or scripts to separate dataset content from instructions.
- Capability inventory: The agent has high-privilege access to the
Bash(cmd:*),Write, andEdittools, allowing for significant system interaction. - Sanitization: The provided scripts and instructions lack data validation or sanitization routines for the content extracted from external files.
- [COMMAND_EXECUTION]: The skill requires the high-privilege
Bash(cmd:*)tool to execute clustering algorithms and generated Python scripts. While this is necessary for the skill's primary function, it provides a powerful capability that could be misused if the agent's behavior is influenced via malicious input data.
Audit Metadata