time-checker
Pass
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: LOWCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The Python script uses
subprocess.runto execute the systemcurlutility. The implementation uses a list of arguments rather than a shell string, which effectively mitigates shell injection risks. - [EXTERNAL_DOWNLOADS] (LOW): The skill connects to
time.isto retrieve HTML content. While this is the intended purpose, it represents an external network dependency on a non-whitelisted domain. - [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) because it processes content from an external website. Evidence Chain: 1. Ingestion points:
scripts/check_time.py(line 17) fetches content viacurl. 2. Boundary markers: Absent; the scraped content is interpolated directly into the output. 3. Capability inventory: Limited to printing to stdout; no file system writes or secondary network operations are available to this skill. 4. Sanitization: Basic HTML tag stripping using regex (re.sub). - [METADATA_POISONING] (INFO): The
SKILL.mdfile troubleshooting section incorrectly listsrequestsandbeautifulsoup4as dependencies, while the actual implementation usessubprocessandre.
Audit Metadata