script-skill
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [TIME_DELAYED_OR_CONDITIONAL] (MEDIUM): The file
scripts/timeout_test.pyimplements an infinite loop (while True: time.sleep(0.1)). While documented as a test for timeout handling, this pattern represents a resource exhaustion/Denial of Service (DoS) risk if deployed in a non-test environment. - [INDIRECT_PROMPT_INJECTION] (MEDIUM): The skill has a significant attack surface for indirect prompt injection as it processes external data through multiple scripts.
- Ingestion points: Standard input (
stdin) is used to receive data inscripts/convert.sh,scripts/extract.py, andscripts/stdin_test.py. - Boundary markers: There are no delimiters or instructions to ignore embedded commands within the processed data.
- Capability inventory: The skill is granted
Bash,Read, andWritepermissions inSKILL.md. - Sanitization: No evidence of input validation, escaping, or sanitization was found in the scripts handling external data.
- [COMMAND_EXECUTION] (LOW): In
scripts/convert.sh, the script echoes raw input usingecho "Converted: $input". Although benign in this specific context, the lack of input sanitization when using shell tools is a security best-practice violation.
Audit Metadata