carousel-orchestrator
Fail
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: In
SKILL.mdStep 2, thePROJECTvariable is constructed using a<slug>extracted from the user's message. This value is used directly in shell commands (mkdir,cd) without sanitization, which allows an attacker to execute arbitrary commands on the host by injecting shell metacharacters like;,&, or backticks.\n- [PROMPT_INJECTION]: The skill facilitates indirect prompt injection. Ingestion points: User-provided topic and key points are extracted inSKILL.mdStep 1. Boundary markers: No delimiters or safety instructions are used in the brief template (references/brief-template.md). Capability inventory: Thecodex exec --full-autocommand provides autonomous file and command execution, whilemessage(send)enables file exfiltration. Sanitization: No validation or escaping is applied to user strings before they are interpolated into the brief.\n- [REMOTE_CODE_EXECUTION]: The use ofcodex exec --full-autoinSKILL.mdStep 3 creates a high-risk environment where an autonomous sub-agent executes logic based on a file containing unsanitized user input. This allows an attacker to hijack the sub-agent's session to perform unauthorized operations.\n- [EXTERNAL_DOWNLOADS]: The skill installs theplaywrightpackage from the npm registry inSKILL.mdStep 2. Playwright is a well-known automation library from a trusted organization (Microsoft).
Recommendations
- AI detected serious security threats
Audit Metadata