workspace-services
Fail
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The shell script
scripts/services.shuses theevalcommand to execute strings parsed directly from external configuration files via theget_ws_commandfunction. This executes the configuration content as active shell code. - [REMOTE_CODE_EXECUTION]: Because the skill executes commands defined in project files that may originate from untrusted sources (e.g., cloned GitHub repositories), it facilitates remote code execution. An attacker can embed malicious logic in the
start-allorstop-allcommands of a project. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through manipulated project metadata.
- Ingestion points: Data is read from
WORKSPACE.mdandpackage.jsonin thescripts/services.shscript. - Boundary markers: No boundary markers or 'ignore' instructions are used when processing these files.
- Capability inventory: The skill can execute arbitrary shell commands, manage processes, and navigate the filesystem.
- Sanitization: There is no sanitization or validation of the commands fetched from external files before they are passed to the shell.
Recommendations
- AI detected serious security threats
Audit Metadata