sus
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The 'Verify Compilation' workflow in
SKILL.md(Step 1) automatically triggers build commands based on the detection of specific configuration files (e.g.,Makefile,package.json,Cargo.toml). Because these commands are sourced directly from the project being audited, a malicious repository could execute unauthorized commands on the agent's environment during the build phase. - [REMOTE_CODE_EXECUTION]: The skill uses the
Bashtool to run the build verification logic. This allows the execution of code defined in the target repository, effectively leading to remote code execution when auditing untrusted sources. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because sub-agents ingest untrusted source code as part of their analysis focus. Maliciously crafted comments or strings within the codebase could attempt to manipulate the sub-agents' reporting or behavior.
- Ingestion points: File content is ingested via
Read,Grep, andGlobtools as specified in the workflow ofSKILL.md. - Boundary markers: The sub-agent prompts in
SKILL.mduse markdown headings but do not implement robust boundary markers or instructions to disregard embedded commands in the data. - Capability inventory: The skill is granted extensive permissions including
Bash(arbitrary command execution),Write, andEdit(filesystem modification) in theallowed-toolssection ofSKILL.md. - Sanitization: There are no procedures defined in the skill for sanitizing or escaping the content read from files before it is processed by the AI models.
Audit Metadata