landing-gen
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill uses a CLI interface (
commander) to perform file system operations. It readspackage.jsonand writes a generated HTML file to the local disk. These are standard operations for a developer tool. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection vulnerability detected in
src/index.ts. The skill reads the entire contents of apackage.jsonfile and interpolates it directly into the OpenAI chat completion prompt. - Ingestion points: Reads
package.jsonfrom the project directory insrc/index.ts(line 11). - Boundary markers: Minimal. It uses a simple newline delimiter (
Generate a landing page for this project:\n\n${context}) which is insufficient to prevent an attacker from including malicious instructions inside thedescriptionor other fields of thepackage.jsonfile to hijack the LLM's behavior. - Capability inventory: The skill has the capability to write files to the local file system (
fs.writeFileSync) and read files (fs.readFileSync). - Sanitization: None. The raw string from the file is passed to the LLM.
Audit Metadata