release-testing-workflow
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Multiple Python scripts in the
scripts/directory, such asbatch_convert_templates.pyand the variousconvert_to_*.pywrappers, utilizesubprocess.callto execute the internalconvert_formats.pyorparse_formats.pyscripts for file format transformation. - [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection (Category 8) because it processes untrusted user-provided requirements and data to generate structured testing output.
- Ingestion points: Files in the
prompts/directory (e.g.,requirements-analysis.md,functional-testing.md, andtest-strategy.md) direct the agent to incorporate user-supplied product specifications and requirements into its analysis. - Boundary markers: The templates lack explicit delimiters (e.g., triple-quotes or XML tags) or specific warnings to the agent to ignore instructions embedded within the user data.
- Capability inventory: The skill's bundled scripts in the
scripts/folder provide the capability to write various file formats (JSON, CSV, MD) to the local filesystem and spawn subprocesses. - Sanitization: There is no evidence of automated sanitization or filtering of the user-provided requirements before they are interpolated into the system prompts.
Audit Metadata