data-processing
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface for indirect prompt injection.
- Ingestion points: Processes JSON, YAML, and TOML data from external sources such as API responses, Kubernetes manifests, and Docker Compose files (
SKILL.md). - Boundary markers: No boundary markers or instructions to ignore embedded commands are present.
- Capability inventory: Utilizes Bash to execute
jqandyq. Notably includes file-write capabilities viayq -i(in-place modification) as seen inSKILL.md. - Sanitization: No evidence of data sanitization or validation of the processed structured data.
- Command Execution (MEDIUM): The skill facilitates the execution of CLI tools (
jq,yq) on the host system. While these are specialized tools,yq -iallows for modification of local configuration files which could be used to weaken system security or persist changes.
Recommendations
- AI detected serious security threats
Audit Metadata