searching-documents-with-coda
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill processes external content from Coda documents (PRDs, roadmaps, etc.) which are ingested into the agent's context, creating a surface for indirect prompt injection.
- Ingestion points: Content is retrieved through
coda pages exportand table data is extracted viacoda export(documented inSKILL.mdandcoda-reference.md). - Boundary markers: The instructions do not specify the use of delimiters or 'ignore' instructions to prevent the agent from executing commands or following directions embedded within the retrieved document content.
- Capability inventory: The agent has the capability to execute the
codaCLI tool, theuvpackage manager, and various shell scripts mentioned indigital-science-reference.md(check_rclone.sh,search_gdrive.sh, etc.). - Sanitization: There is no evidence of sanitization or validation of the retrieved text before it is processed by the agent.
- [COMMAND_EXECUTION]: The skill is centered around the execution of a local CLI tool (
coda) and several bash scripts. It includes instructions to install the tool from a local source path (~/aves/coda-cli) using theuvtool manager.
Audit Metadata