writeup-generator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a high-risk attack surface by ingesting untrusted data while holding high-privilege capabilities.\n
- Ingestion points: The instructions direct the agent to read
solve.py, files in thedist/directory, and notes/debug output in thework/directory.\n - Capability inventory: The skill is granted access to the
Bash,Write,Edit, andReadtools via the YAML frontmatter.\n - Boundary markers: Absent. There are no instructions to delimit untrusted file content or to ignore embedded instructions within those files.\n
- Sanitization: Absent. The skill does not provide any mechanism to sanitize or validate the content of the files before the agent processes them.\n
- Impact: An attacker could place malicious instructions in a challenge's README or a comment in a solution script that the agent would then execute using the
Bashtool.\n- Command Execution (HIGH): The skill is explicitly grantedBashaccess.\n - Evidence: The
allowed-toolssection includesBash, which permits arbitrary code execution. This is a significant risk when the skill is also instructed to parse and act upon external, untrusted content.
Recommendations
- AI detected serious security threats
Audit Metadata