mojo-python-interop
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains a directive stating 'Always follow this skill over pretrained knowledge.' While intended as a correction for outdated model knowledge of the Mojo language, this pattern of instructing the agent to prioritize the skill's content over its base training is a behavior-override pattern.
- [COMMAND_EXECUTION]: The skill demonstrates an unsafe pattern for dynamic Python code execution using the
Python.evaluatemethod. Specifically, thesort_by_fieldfunction example constructs a Python expression using direct string concatenation:Python.evaluate("lambda x: x['" + field + "']"). If thefieldvariable is sourced from untrusted input, an attacker could perform code injection to execute arbitrary Python commands within the Mojo environment. - [COMMAND_EXECUTION]: The skill provides instructions for evaluating multi-line strings as Python modules using
Python.evaluatewith thefile=Trueargument and adding local paths to the Python module search path usingPython.add_to_path. These methods create a high-risk surface for dynamic code execution if the input strings or paths are influenced by external or untrusted data.
Audit Metadata