skill-perfection
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (LOW): The
preflight.pyscript parses untrusted markdown files provided as input. - Ingestion points: The script reads the target markdown file using
Path.read_text()in therun_preflightfunction. - Boundary markers: Absent; the script processes the entire file content without specific delimiters or instructions to ignore embedded commands.
- Capability inventory: The script performs outbound network
HEADrequests viahttpxto any URL found in the input file. It also usesast.parsefor syntax checking. - Sanitization: No sanitization is performed on the extracted URL strings before they are used in network requests.
- [Data Exposure & Exfiltration] (LOW): The script automatedly connects to external endpoints found in audited files.
- Evidence: The
check_urlsfunction inpreflight.pyuseshttpx.AsyncClient().head(url)to verify link accessibility. WhileHEADrequests are metadata-only, they constitute outbound network traffic to arbitrary domains determined by untrusted input data. - [Command Execution] (LOW): The skill instructions require the agent to execute a local bundled script.
- Evidence:
SKILL.mdinstructs the user to runuv run python ${SKILL_DIR}/scripts/preflight.py. This is a controlled execution of a bundled script, but it is the primary mechanism for the network side effects mentioned above. - [External Downloads] (LOW): The use of
uv runmay trigger dependency resolution. - Evidence: The script relies on optional dependencies
httpxandPyYAML. When executed viauv run, the environment may attempt to download these packages if they are not already cached.
Audit Metadata