learning-leadership-development

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMPROMPT_INJECTION
Full Analysis
  • [Dynamic Execution] (MEDIUM): The skill uses sys.path.insert(0, str(framework_path)) where the path is computed at runtime using Path(__file__).parent.parent / "framework". This pattern of dynamic loading from computed paths can be exploited if the directory structure is manipulated to redirect imports to malicious modules.\n- [Indirect Prompt Injection] (LOW): The skill processes untrusted input through the content parameter, creating an injection surface.\n
  • Ingestion points: parameters["content"] in skill.py.\n
  • Boundary markers: None present in the code or prompt logic.\n
  • Capability inventory: None; the skill lacks network access, file write permissions, or shell execution capabilities in the provided snippet.\n
  • Sanitization: None; the content is processed directly.\n- [General Code Issue] (INFO): The variable skill_dir is referenced in the execute method for output strings and artifacts but is not defined anywhere in the script, which will result in a NameError during execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 02:38 AM