pi-share
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It fetches session data from external GitHub Gists and interpolates this untrusted content directly into a prompt sent to a secondary AI model for summarization. An attacker could craft a malicious Gist containing instructions that override the summarization task.\n
- Ingestion points: Conversation data is ingested from arbitrary GitHub Gists via the
fetchSessionHtmlfunction infetch-session.mjs.\n - Boundary markers: The prompt template used in the
generateHumanSummaryfunction lacks delimiters or explicit instructions for the model to ignore embedded commands within the session transcript.\n - Capability inventory: The skill uses
child_process.spawnSyncto execute a local AI utility (pi), passing the untrusted data as a command-line argument for processing.\n - Sanitization: No escaping, filtering, or validation is performed on the retrieved session content before it is interpolated into the prompt string.\n- [COMMAND_EXECUTION]: The script
fetch-session.mjsinvokes thepicommand-line tool usingspawnSync. While the tool itself is part of the agent's expected environment, the command is constructed with a prompt containing untrusted data fetched from the network, which facilitates the indirect injection vector.\n- [EXTERNAL_DOWNLOADS]: The skill performs network requests toapi.github.comandraw.githubusercontent.comto retrieve Gist content. While GitHub is a well-known service, the content itself is user-generated and untrusted as it is retrieved based on arbitrary user-provided IDs or URLs.
Audit Metadata