pysam
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is vulnerable to indirect prompt injection as it ingests untrusted data from genomic datasets and has powerful output capabilities.
- Ingestion points: Objects like
pysam.AlignmentFile,pysam.VariantFile, andpysam.FastaFileread external file content into the agent context. - Boundary markers: Absent. The skill does not implement delimiters or 'ignore' instructions for data processed from these files.
- Capability inventory: The skill can execute system-level commands via
pysam.samtoolsandpysam.bcftoolsand write files to the filesystem. - Sanitization: None. Genomic metadata (e.g., read names, headers, or INFO fields) is not sanitized for potential natural language instructions.
- [Command Execution] (MEDIUM): The skill provides access to bioinformatics tools that interact directly with the filesystem.
- Evidence:
pysam.samtools.sort,pysam.samtools.index, andpysam.bcftools.viewcalls can be used to create, overwrite, or manipulate files based on potentially untrusted input. - [External Downloads] (LOW): The skill depends on the external
pysampackage. - Evidence:
SKILL.mdinstructs the installation ofpysamviauv pip install.
Recommendations
- AI detected serious security threats
Audit Metadata