add-config-field

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) due to the unsafe interpolation of untrusted data into system configuration templates.\n
  • Ingestion points: User-provided inputs 'Field name', 'Default value', 'Section', and 'Comment' are ingested as defined in the 'Input' section of SKILL.md.\n
  • Boundary markers: Absent. There are no delimiters or instructions to treat the user input as non-executable data when written to target files.\n
  • Capability inventory: The skill uses the 'Edit' tool to modify 'plugins/majestic-engineer/commands/workflows/init.md' (which stores YAML templates for other agents) and 'plugins/majestic-engineer/agents/config-reader.md' (which contains migration logic and changelogs).\n
  • Sanitization: Absent. User input, including multi-line YAML 'Default value' strings, is interpolated directly into the destination files without escaping or structural validation, allowing an attacker to inject malicious instructions or corrupt configuration logic.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 11:40 PM