blueprint-curate-docs
Fail
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill implements Claude Code dynamic context injection using the
!syntax inSKILL.md. The commandfind . -maxdepth 1 \( -name package.json -o -name pyproject.toml -o -name requirements.txt \) -exec grep -m1 "^$1[\":@=]" {} +executes shell commands automatically when the skill is loaded. By including the unsanitized user argument$1directly in the command string, the skill is vulnerable to command injection, allowing an attacker to execute arbitrary shell commands.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from the internet to build AI context files.\n - Ingestion points: Data is collected from external URLs using
WebFetchandWebSearchin the 'Research and gather documentation' step.\n - Boundary markers: There are no markers or instructions to delimit or ignore instructions within the fetched web content.\n
- Capability inventory: The skill uses
Bash,Write, andReadtools, which could be abused if malicious instructions are processed.\n - Sanitization: The skill does not sanitize the external documentation before writing it to files in the
docs/blueprint/ai_docsdirectory.
Recommendations
- AI detected serious security threats
Audit Metadata