agent-creator
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/main.cjsmodifies local.cjsrouting files by injecting thenameanddescriptionvariables directly into Javascript code strings. Since these variables are not sanitized for Javascript control characters like single quotes, an attacker could potentially inject arbitrary code that executes when the routing tables are loaded by the system. - [COMMAND_EXECUTION]: The skill uses
node:child_process.spawnSyncto execute local scripts and utilizes theBashtool extensively for file manipulation and updating the project's routing infrastructure. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. Ingestion points:
WebFetchoperations frombls.govandmymajors.cominSKILL.md. Boundary markers: Includes a 'Security Review Gate' (Step 2.5) but lacks programmatic enforcement. Capability inventory: UsesBash,Write,Edit, andTasktools. Sanitization: Relies on manual AI instructions for scanning rather than code-level validation. - [DATA_EXFILTRATION]: The skill performs extensive read and write operations within the sensitive
.claude/directory, including routing tables (routing-table-intent-keywords.cjs) and memory files, which contain core operational logic and project metadata.
Recommendations
- AI detected serious security threats
Audit Metadata