explain
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill templates bash commands by directly interpolating the user-provided
$TARGETvariable into strings such astest -f "$TARGET"andast-grep -p "function $TARGET". This lack of sanitization allows for arbitrary command execution on the host if the target string contains shell metacharacters (e.g.,; rm -rf /). - [PROMPT_INJECTION] (HIGH): The skill is highly susceptible to Indirect Prompt Injection (Category 8) as it is designed to ingest and explain untrusted external code.
- Ingestion points: Uses
Read,Grep, andGlobtools to collect content from files and directories specified by the user or found via symbol search. - Boundary markers: Absent; the skill does not use delimiters or provide 'ignore instructions' warnings to the expert agents when processing ingested content.
- Capability inventory: The agent has access to
Bashfor command execution and theTasktool for calling other agents, and it can modify the filesystem (e.g., updatingARCHITECTURE.md). - Sanitization: No validation or filtering is performed on ingested code content before it is processed, allowing malicious comments or documentation to influence the agent's behavior.
Recommendations
- AI detected serious security threats
Audit Metadata