todo-list-csv
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/todo_csv.pyexecutes thegit rev-parse --show-toplevelcommand to determine the project root. This is a standard and expected operation for developer tools. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). Evidence: 1. Ingestion points: The script
scripts/todo_csv.pyreads task items from a CSV file located in the project root via the_read_rowsfunction. 2. Boundary markers: The skill does not use specific markers or instructions to delimit or ignore instructions within the CSV content. 3. Capability inventory: Thecmd_planfunction generates a JSON payload for theupdate_plantool, which directly influences the agent's future steps. 4. Sanitization: The script performs only basic whitespace stripping on theitemfield from the CSV before passing it to the agent's plan, allowing potentially malicious strings to be treated as legitimate instructions.
Audit Metadata