find-replace
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill processes untrusted data from files that could contain malicious instructions.
- Ingestion points: Files read via
rg(ripgrep) orcatfor pattern matching and replacement. - Boundary markers: None present; the agent treats file content as raw data for regex processing.
- Capability inventory: The skill uses the
Bashtool to executesd, which has file-write permissions, andrg, which can read arbitrary files. - Sanitization: No sanitization of file content is performed before processing.
- Metadata Poisoning (LOW/INFO): The automated scan flagged
logger.infoas a malicious URL. This is a false positive; the string appears in a regex replacement examplesd 'console\.log\((.*)\)' 'logger.info($1)'and is not a network location. - Command Execution (LOW): The skill requires and executes external CLI tools (
sd,rg). While these are standard utilities, their use on untrusted file paths should be monitored.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata