webnovel-resume
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute local Python scripts (
webnovel.py) and Git commands to manage project state. - [COMMAND_EXECUTION]: Employs destructive operations such as
git reset --hardandworkflow cleanup, which can cause permanent loss of data in the user's local project directory. - [PROMPT_INJECTION]: Identified an Indirect Prompt Injection surface (Category 8). The skill reads workflow state, including previous commands and arguments, from local files (
state.json,workflow_state.json). - Ingestion points: Processes data from
.webnovel/state.jsonandworkflow_state.jsonvia thewebnovel.pyscript. - Boundary markers: No delimiters or instructions to ignore embedded commands are present when reading data from the state files.
- Capability inventory: The skill utilizes
Bashfor shell command execution andAskUserQuestionfor user interaction. - Sanitization: There is no evidence of sanitization or validation for the
original_commandororiginal_argsvariables before they are used to re-trigger tasks in Step 7. - [COMMAND_EXECUTION]: Dynamically assembles and executes agent commands (e.g.,
/{original_command}) based on unsanitized data retrieved from the project's local state files.
Audit Metadata