capability-evolver
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The cleanup utility in
src/ops/cleanup.jsincorrectly handles file deletion by concatenating file paths into a shell command string (rm -f). Because filenames are not sanitized for shell metacharacters (like$(...)) beyond simple double-quoting, an attacker who can influence file creation in the evolution directory could execute arbitrary shell commands when the cleanup task runs. - [PROMPT_INJECTION]: The skill's core logic involves reading session logs (
.jsonlfiles) which contain untrusted user messages. These logs are processed and injected into prompts for a sub-agent with the capability to write files and modify the repository. This represents a significant attack surface for indirect prompt injection where a user message could influence the autonomous modifications made to the system. - [COMMAND_EXECUTION]: The validation mechanism in
src/gep/solidify.jsexecutes shell commands defined inGeneassets. While a safety check (isValidationCommandAllowed) is performed on the command prefix and specific shell operators, the contents of these genes can be influenced by the agent's output, potentially allowing for code execution through allowed prefixes likenode -e. - [EXTERNAL_DOWNLOADS]: The skill communicates with an external hub (
evomap.ai) to fetch tasks and reusable evolution assets. While it includes verification steps for these assets, it introduces a dependency on the security and integrity of the remote hub.
Audit Metadata