ai-taking-actions
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill provides examples using
dspy.PythonInterpreter({}).execute(expression)inSKILL.mdandexamples.md. This allows for the execution of arbitrary Python code string passed to the interpreter. In the context of an autonomous agent, this 'expression' is generated by the LLM, creating a direct path for Remote Code Execution (RCE) if the agent's instructions are subverted. - EXTERNAL_DOWNLOADS (LOW):
SKILL.mdinstructs users to install external packages usingpip install langchain-community. This is a standard dependency management practice but involves fetching code from a public registry. - DATA_EXFILTRATION (LOW): The
examples.mdfile contains network operations to external services, including a hardcoded IP address20.102.90.50(ColBERTv2 server) andwttr.in. While these appear to be for demonstration purposes, they represent unauthorized network egress to non-whitelisted domains. - PROMPT_INJECTION (LOW): Category 8: Indirect Prompt Injection surface identified.
- Ingestion points: User input is accepted via the
questionparameter inagent(question=...)calls in bothSKILL.mdandexamples.md. - Boundary markers: None. No delimiters or instructions are provided to the model to treat user input as untrusted data.
- Capability inventory: The skill possesses powerful capabilities including
dspy.PythonInterpreter.execute()(code execution),requests.get()(network access), anddspy.ColBERTv2(remote database retrieval). - Sanitization: Absent. No logic is present to validate or sanitize the
expressionbefore it is passed to the Python interpreter.
Audit Metadata