residues
Pass
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on the
Bashtool to perform mathematical computations by invoking Python scripts (scripts/sympy_compute.py,scripts/z3_solve.py) with arguments constructed from user-provided mathematical expressions. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through a command injection vulnerability where untrusted user input is interpolated into shell commands.
- Ingestion points: User-provided function expressions (
f(z)) and singularity points (z0) defined in bothSKILL.mdandSKILL.v6.md. - Boundary markers: The command templates lack boundary markers or explicit instructions to the agent to treat user input as non-executable data.
- Capability inventory: The agent uses the
Bashtool to executeuv run pythoncommands, which can be exploited if the interpolated strings contain shell metacharacters. - Sanitization: No sanitization, escaping, or validation logic is specified for the user-supplied strings before they are interpolated into the shell commands.
Audit Metadata