moai-formats-data
Warn
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The module
modules/caching-performance.mdutilizes thepicklelibrary for both memory estimation and persistent caching. Specifically, theMultiLevelCache._load_persistent_cachemethod callspickle.load(f)on a file path. Becausepickledeserialization can execute arbitrary code and the skill operates in an environment with file system access (Write/Edit tools), this presents a significant security risk if the cache file is tampered with or replaced by an attacker. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to process, decode, and validate various data formats (TOON, JSON, YAML) from external sources. This ingestion surface is vulnerable to indirect prompt injection if the data contains malicious instructions that the agent might interpret as commands. While the skill includes a
DataValidatormodule, its effectiveness depends on strict schema enforcement by the implementation. - [COMMAND_EXECUTION]: The combined presence of file manipulation tools (Write, Edit) and unsafe deserialization logic (
pickle.load) creates a pathway for persistent command execution if the agent is manipulated into writing a malicious payload to the cache location.
Audit Metadata