market-analyze
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.mddescribe executing a Python script viaBashwith interpolated user arguments (<symbol>and--csv PATH). This pattern can lead to command injection if the underlying tool execution logic does not strictly validate or escape shell-sensitive characters in the arguments. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the ingestion of untrusted market data, particularly when using the
--csv PATHargument to load external files. - Ingestion points: Arguments passed to
run.py(<symbol>) and the contents of the file specified by the--csv PATHparameter. - Boundary markers: Absent. There are no delimiters or explicit instructions in the prompt to ensure the agent ignores or sanitizes instructions embedded within the loaded data.
- Capability inventory: The skill has the capability to execute commands using
Bash(python3 *)and read files usingReadandGlobtools. - Sanitization: No explicit validation or sanitization of the input symbol or the CSV content is performed within the visible code.
Audit Metadata