peer-reviewer
Fail
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (CRITICAL): The
SkillSearchAdapterinsrc/adapters/skill_search.tsuseschild_process.execto run external search tools. The command string is built by interpolating aclaimvariable that is extracted by an LLM from the paper being reviewed. The sanitization performed (replace(/"/g, '\"')) only addresses double quotes and fails to block subshell execution patterns like$(...)or backticks, enabling arbitrary command injection. - PROMPT_INJECTION (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8). It ingests untrusted text from academic papers via
src/index.ts. TheDeconstructionAgentis explicitly instructed insrc/prompts.tsto 'Quote, Don't Paraphrase' when extracting claims. This ensures that any malicious shell payloads embedded in the source text are preserved and passed directly to the vulnerable execution component. - CREDENTIALS_UNSAFE (LOW): The skill's configuration logic in
src/index.tsandsrc/adapters/vertex_ai.tsspecifically attempts to locate and read a local file namedgoogle.jsoncontaining highly sensitive Google Cloud service account keys. This represents a risk of credential exposure in shared or insecure environments. - INDIRECT PROMPT INJECTION (HIGH): Mandatory Evidence Chain: 1. Ingestion point:
src/index.tsaccepts raw text or file paths from user input. 2. Boundary markers: Absent inDECONSTRUCTOR_PROMPT. 3. Capability inventory: System command execution viaexecAsyncinsrc/adapters/skill_search.tsand file system writes insrc/adapters/file_storage.ts. 4. Sanitization: Insufficient shell escaping (only double quotes) is applied to the extracted claims before they are executed in a shell environment.
Recommendations
- AI detected serious security threats
Audit Metadata