moai-lang-r
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill explicitly allows the agent to use
Bash(R:*)andBash(Rscript:*). This enables the execution of arbitrary R code on the underlying system. - [PROMPT_INJECTION] (HIGH): The skill has a high Indirect Prompt Injection (IPI) risk profile due to its design to process external content combined with high-privilege execution tools.
- Ingestion points: The agent is triggered by and reads content from
.R,.Rmd,.qmd,DESCRIPTION, andrenv.lockfiles, which may contain attacker-controlled data. - Boundary markers: There are no instructions to use delimiters or ignore instructions embedded in the analyzed code or data files.
- Capability inventory: The skill possesses file system access (
Read,Grep,Glob) and command execution capabilities (Bash). - Sanitization: No sanitization or validation of the input files is performed before they are processed by the agent's logic or passed to tools.
- [REMOTE_CODE_EXECUTION] (LOW): The skill instructions include
renv::installandrenv::restore. While these perform network operations to download and install R packages,renvis a standard industry tool, and this behavior is expected for its stated purpose.
Recommendations
- AI detected serious security threats
Audit Metadata