apex-tier2
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill employs dynamic execution patterns in its validation scripts. Specifically,
scripts/validate.shuses theevalcommand andscripts/validate.ps1usesInvoke-Expressionto run project-specific validation tasks. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it executes commands derived from external project files without sanitization.
- Ingestion points: Project configuration files including
package.json,pyproject.toml,requirements.txt,go.mod, andCargo.toml. - Boundary markers: None identified; instructions do not contain delimiters to ignore embedded commands in the target project.
- Capability inventory: The skill can execute arbitrary shell commands via
evalandInvoke-Expression, and usesnpm,npx,pytest,go,cargo, and the GitHub CLI (gh). - Sanitization: No validation or escaping is performed on the command strings extracted from project configuration files before execution.
- [COMMAND_EXECUTION]: The skill automatically generates and submits pull requests using the
ghcommand-line tool, which involves executing external processes with potentially sensitive project data.
Audit Metadata