create-team
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill leverages the
Bashtool to perform local file operations and automation. Specifically, it usesgrepto verify agent IDs inagents/_registry.yml,cpto initialize new team files from templates, andnpm run update-readmesto regenerate documentation via a local task runner. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by design.
- Ingestion points: User-provided inputs for 'Team purpose', 'role', and 'responsibilities' are collected in Steps 1, 3, and 6.
- Boundary markers: The skill does not explicitly define delimiters (e.g., XML tags or triple quotes) to wrap user-provided prose when writing to the destination markdown files.
- Capability inventory: The skill possesses
Write,Edit, andBashcapabilities, allowing it to modify registry files and create executable agent configurations. - Sanitization: There is no evidence of input validation or escaping for user-provided text before it is interpolated into the team definition files.
- [EXTERNAL_DOWNLOADS]: The procedure recommends running
npm installto ensure thejs-yamldependency is available. While this involves downloading from the well-known NPM registry, it is a standard practice for maintaining the skill's supporting scripts.
Audit Metadata