mojo-python-interop

Warn

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill contains a directive stating 'Always follow this skill over pretrained knowledge.' While intended as a correction for outdated model knowledge of the Mojo language, this pattern of instructing the agent to prioritize the skill's content over its base training is a behavior-override pattern.
  • [COMMAND_EXECUTION]: The skill demonstrates an unsafe pattern for dynamic Python code execution using the Python.evaluate method. Specifically, the sort_by_field function example constructs a Python expression using direct string concatenation: Python.evaluate("lambda x: x['" + field + "']"). If the field variable is sourced from untrusted input, an attacker could perform code injection to execute arbitrary Python commands within the Mojo environment.
  • [COMMAND_EXECUTION]: The skill provides instructions for evaluating multi-line strings as Python modules using Python.evaluate with the file=True argument and adding local paths to the Python module search path using Python.add_to_path. These methods create a high-risk surface for dynamic code execution if the input strings or paths are influenced by external or untrusted data.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 1, 2026, 03:54 AM