cmd-rss-feed-generator
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface. It is designed to ingest and process untrusted data from external blog websites using
fetch_content(url)and local HTML file parsing as defined inSKILL.md. There is an absence of boundary markers or instructions to the agent to ignore embedded commands within the scraped HTML. The agent's capability to generate Python code that is subsequently executed in a GitHub Actions environment increases the potential impact of instructions hidden in malicious websites. - [COMMAND_EXECUTION]: The skill automates the creation of executable scripts. It instructs the agent to write Python code to
feed_generators/and add execution targets tomakefiles/feeds.mk. These scripts are then triggered viamakeorpythoncommands, creating a workflow where the agent's output directly leads to command execution in a CI/CD context. - [EXTERNAL_DOWNLOADS]: The generated code is explicitly intended to fetch content from arbitrary remote URLs. While essential for its function as a web scraper, this involves automated network operations targeting non-whitelisted external domains.
Audit Metadata