readme-craft
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill contains literal templates for downloading and executing scripts directly from the internet via a shell pipe.
- Evidence: Multiple instances of
curl -sSL https://example.com/install.sh | bashare found inSKILL.mdunder sections such as 'Hero Section', 'Quick Start', and 'Installation'. - Risk: This is a classic RCE vector. While intended as a template, an automated agent might attempt to execute this command to 'test' the documentation it generated, or a developer might copy-paste it without updating the URL, leading to the execution of untrusted code from an unverified domain.
- [COMMAND_EXECUTION] (MEDIUM): The skill provides instructions for sensitive command-line operations.
- Evidence: Templates in
SKILL.mdandreferences/section-templates.mdincludechmod +x install.sh,apt install,brew install, andmytool init. - Risk: These commands modify system state or permissions. If generated and executed without human oversight, they can lead to unauthorized system changes.
- [PROMPT_INJECTION] (LOW): The skill is designed to ingest and process untrusted external data in the form of existing project documentation.
- Ingestion points: The skill description states it is for 'improving existing docs', meaning it reads existing user-provided README files and project documentation.
- Boundary markers: Absent. The skill does not provide instructions to the agent to ignore instructions embedded within the documentation it is processing.
- Capability inventory: Based on the provided files, the skill's capability is limited to generating documentation text (display/output only).
- Sanitization: Absent. There is no evidence of filtering or escaping malicious instructions found in the source documentation.
- Risk: A malicious project could include documentation containing 'Indirect Prompt Injection' designed to hijack the agent's behavior during the README generation process.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://example.com/install.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata