windows-clipboard

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes local PowerShell cmdlets (Get-Clipboard, Set-Clipboard) and reads file content (Get-Content) to interact with the host system.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from the system clipboard into the agent's context.
  • Ingestion points: The Get-Clipboard command defined in SKILL.md retrieves content from an external source (the clipboard).
  • Boundary markers: No specific boundary markers or delimiters are defined to isolate the clipboard data from the agent's instructions.
  • Capability inventory: The skill has the capability to execute PowerShell commands and read files from the local file system.
  • Sanitization: No sanitization or filtering logic is present to identify or ignore instructions embedded within the clipboard content.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 04:19 PM