stock-report
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: In
SKILL.md, the instructions tell the agent to execute a shell command where user-supplied$ARGUMENTSare directly interpolated into a bash string:python3 ... $ARGUMENTS. This allows for arbitrary command execution on the host machine if the input contains shell metacharacters like;,&&, or|. - [DATA_EXFILTRATION]: The
SKILL.mdfile contains a hardcoded absolute file path:/Users/kikuchihiroyuki/stock-skills/.claude/skills/stock-report/scripts/generate_report.py. This discloses the system's local username and internal directory structure, which is a sensitive information leak. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It retrieves data from external sources (Yahoo Finance, Neo4j industry research, and investment notes) and prints summaries directly to the agent's context without sanitization.
- Ingestion points: Data enters the context via
get_stock_detail,get_industry_research_for_sector, andget_prior_reportinscripts/generate_report.py. - Boundary markers: The script lacks specific delimiters or 'ignore embedded instructions' warnings when outputting the fetched external data.
- Capability inventory: The skill has access to the
Bashtool (restricted topython3) as defined in theallowed-toolsmetadata. - Sanitization: No escaping or validation is performed on external content (e.g., industry catalysts or summaries) before it is interpolated into the agent's output.
Recommendations
- AI detected serious security threats
Audit Metadata