browsing-bluesky
Fail
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
extract_keywordsfunction inscripts/bsky.pyis vulnerable to code injection. It constructs a Python script as a string, interpolating thestopwordsparameter directly into the code before executing it viasubprocess.run([venv_python, "-c", extraction_script], ...). An attacker who can influence thestopwordsargument (e.g., via indirect prompt injection or social engineering) could execute arbitrary Python code in the environment. - [REMOTE_CODE_EXECUTION]: Due to the code injection vulnerability in
extract_keywords, the skill allows for arbitrary execution of Python code. This is particularly critical as the agent may be induced to call this function with parameters influenced by untrusted external data (such as a Bluesky user bio or post content). - [PROMPT_INJECTION]: The skill exhibits a significant attack surface for indirect prompt injection by fetching and processing large amounts of untrusted data from the Bluesky API and firehose.
- Ingestion points: Data is ingested from
api.bsky.appandwss://jetstream1.us-east.bsky.networkviascripts/bsky.pyandscripts/zeitgeist-sample.js. - Boundary markers: No delimiters or boundary markers are used to separate untrusted content from agent instructions.
- Capability inventory: The skill has access to shell command execution (
subprocess.run), network operations (requests,ws), and file system writes (temporary files). - Sanitization: Ingested content (post text, descriptions) is concatenated and processed without sanitization or validation before being used in keywords extraction or returned to the agent context.
Recommendations
- AI detected serious security threats
Audit Metadata