doc
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses dynamic context injection via the
!dateand!lscommands to fetch current system information when the skill is loaded. These commands are used for innocuous purposes but involve executing shell code at load time. - [COMMAND_EXECUTION]: User-provided
$ARGUMENTSare used to construct file system paths for writing and searching documents (e.g.,docs/{project}/). This presents a potential path traversal vulnerability if the agent or platform does not adequately sanitize the project and slug identifiers. - [PROMPT_INJECTION]: The skill identifies a surface for indirect prompt injection by ingesting data from external files. Ingestion points: Files matching
docs/{project}/*.mdand templates in@_templates/. Boundary markers: None identified. Capability inventory: UsesBash,Write, andEdittools to modify the file system and log entries. Sanitization: No explicit sanitization or validation of the ingested file content is specified.
Audit Metadata