publish-weekly
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The skill allows reading arbitrary files from the local filesystem through the
filenameinput parameter. There is no evidence of path sanitization or restriction to a specific directory. - Evidence (Ingestion): File
SKILL.mddefines an inputfilenamewhich is used to read content from the working directory. - Evidence (Exfiltration): The content of the file specified by
filenameis subsequently sent to an external REST endpoint{BASE_URL}/api/weeklyvia a POST or PATCH request. - Risk: An attacker could provide a path like
../../.envor~/.ssh/id_rsato read and upload sensitive credentials to the CMS. - Indirect Prompt Injection (HIGH): The skill processes untrusted external content (local markdown files) and possesses high-privilege capabilities (network write operations).
- Ingestion points: The
{filename}parameter inSKILL.mdtriggers the reading of external file content. - Boundary markers: None. The content is read and mapped directly to the
contentfield of the JSON payload. - Capability inventory: The skill performs
GET,POST, andPATCHrequests to an external API and writes response logs to the local disk (published/{week_id}.json). - Sanitization: No sanitization or validation of the file content is mentioned before it is processed or sent.
Recommendations
- AI detected serious security threats
Audit Metadata