find-replace
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill uses
Bashto execute commands likesd 'oldPattern' 'newPattern'. If an agent uses unsanitized user input for these patterns, an attacker can inject shell characters (e.g.,;,`,$()) to execute arbitrary code on the system. - [PROMPT_INJECTION] (HIGH): This skill is vulnerable to Indirect Prompt Injection (Category 8). An attacker could place malicious patterns in a codebase that, when processed by this skill, trigger unintended modifications or data leaks.
- Ingestion points: Search/replace patterns and file contents processed by
rgandsd. - Boundary markers: Absent. The instructions provide examples but no strict delimiters to isolate untrusted input.
- Capability inventory: File system write access and arbitrary shell command execution via Bash.
- Sanitization: Insufficient. While the documentation suggests quoting patterns to prevent shell interpretation, it does not provide logic for escaping characters in an automated agent context.
- [EXTERNAL_DOWNLOADS] (LOW): Recommends installing
sdviabreworcargo. These are standard package managers, and whilesdis a trusted open-source tool, the reliance on external installation introduces a minor supply-chain risk. - [SAFE] (INFO): The automated scan alert for
logger.infois a false positive; the scanner incorrectly identified a JavaScript method call as a malicious TLD/URL.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata