windows-clipboard
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local PowerShell cmdlets (
Get-Clipboard,Set-Clipboard) and reads file content (Get-Content) to interact with the host system. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from the system clipboard into the agent's context.
- Ingestion points: The
Get-Clipboardcommand defined inSKILL.mdretrieves content from an external source (the clipboard). - Boundary markers: No specific boundary markers or delimiters are defined to isolate the clipboard data from the agent's instructions.
- Capability inventory: The skill has the capability to execute PowerShell commands and read files from the local file system.
- Sanitization: No sanitization or filtering logic is present to identify or ignore instructions embedded within the clipboard content.
Audit Metadata