moai-lang-r
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill is designed to trigger on and read user-controlled files such as
.R,.Rmd, andrenv.lock. Since the skill also has permissions to execute code viaBash(R:*), an attacker could embed malicious instructions in these data files to influence the agent's behavior. - Ingestion points: Files with extensions
.R,.Rmd,.qmd, as well asDESCRIPTIONandrenv.lockfiles. - Boundary markers: Absent. The skill does not provide specific instructions to the agent to treat content within these files as untrusted data.
- Capability inventory: Uses
Bash(R:*),Bash(Rscript:*),Read,Grep, andGlobtools. - Sanitization: Absent. There are no patterns for escaping or validating the content of the processed files.
- Command Execution (SAFE): The skill uses
Bash(R:*)andBash(Rscript:*)to execute R code. While arbitrary code execution is a high-privilege capability, it is the primary and intended purpose of this R development specialist skill. - External Downloads (SAFE): The skill references
renv::installfor package management. This is a standard and expected practice for R project dependency management.
Audit Metadata