qa-report
Fail
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Both
scripts/create_bug_report.shandscripts/generate_test_cases.shutilize aprompt_inputfunction that performs dynamic variable assignment usingevalon unvalidated input. This pattern is inherently unsafe as it allows shell metacharacters to trigger arbitrary command execution. - [REMOTE_CODE_EXECUTION]: The skill instructions in
SKILL.mddirect the AI agent to execute shell scripts to generate reports. Since these scripts are vulnerable to command injection and the agent may populate them with data sourced from external environments (such as Figma designs via the Figma MCP), this creates a significant risk of arbitrary code execution. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface.
- Ingestion points: User request strings and external design specifications from Figma (referenced in
SKILL.mdandreferences/figma_validation.md). - Boundary markers: None identified.
- Capability inventory: Subprocess execution of internal shell scripts that contain command injection vulnerabilities.
- Sanitization: Absent; the shell scripts do not sanitize or escape input prior to evaluation.
Recommendations
- AI detected serious security threats
Audit Metadata