watchlist

Warn

Audited by Gen Agent Trust Hub on Mar 3, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses the Bash tool to execute a Python script. The script location is hardcoded as an absolute path specific to a local user's environment (/Users/kikuchihiroyuki/...), which can lead to failures or unexpected behavior in different environments.
  • [DATA_EXFILTRATION]: The script is susceptible to path traversal. The name parameter, sourced from user-controlled $ARGUMENTS, is used directly in os.path.join without sanitization. An attacker could provide a name like ../../target_file to read or write JSON files outside the intended data/watchlists directory.
  • [REMOTE_CODE_EXECUTION]: The script dynamically modifies the sys.path using sys.path.insert(0, ...) to include parent directories and then attempts to import local modules (src.data.graph_store, src.data.history_store) that are not part of the provided skill files. This behavior can be exploited if an attacker can place malicious code in those relative paths.
  • [PROMPT_INJECTION]: The skill processes external data from local JSON files that could contain malicious instructions.
  • Ingestion points: manage_watchlist.py reads and displays stock symbol lists from files in the data/watchlists/ directory.
  • Boundary markers: No delimiters or instructions to ignore embedded commands are used when outputting file contents to the agent.
  • Capability inventory: The skill possesses filesystem read/write capabilities and is executed via the Bash tool.
  • Sanitization: There is no validation or sanitization of the input arguments or the content retrieved from the JSON files.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 3, 2026, 06:30 PM