seo-content
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): In
SKILL.mdStep 5, the agent executescd /home/milad/[product-slug] && vercel --prod. The[product-slug]variable is derived from an external file (products.json) or user input and is not sanitized before being passed to a shell, allowing for arbitrary command execution (e.g.,slug; rm -rf /). - PROMPT_INJECTION (HIGH): The skill performs web searches for keywords and competitors (SKILL.md Step 2) and feeds that untrusted data into the generation process. The resulting content is saved to the file system and deployed to Vercel without human review. Evidence Chain: 1. Ingestion points: Web search results (Step 2). 2. Boundary markers: Absent. 3. Capability inventory: File system writes via
save_blog_post.jsand production deployment viavercel(Step 5). 4. Sanitization: None detected. - DATA_EXFILTRATION (MEDIUM): The skill sends summaries and generated content to a Telegram endpoint (Step 6). If the content generation is compromised via indirect injection, this channel could be used to exfiltrate sensitive data or environment information.
- PATH_TRAVERSAL (MEDIUM): The
scripts/save_blog_post.jsscript usesproductSlugandpostSlugarguments to construct file paths viapath.joinwithout sanitizing for directory traversal characters (..), enabling writes to unintended directories on the host.
Recommendations
- AI detected serious security threats
Audit Metadata