investigate-metric
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.md(Step 2.3) suggest that the agent should rungit logto identify code changes in the repository that might correlate with observed metric anomalies. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) as it processes untrusted data from external sources (PostHog event properties and query results). \n
- Ingestion points: Data enters the agent's context through tools like
posthog:query-trends,posthog:insight-get, andposthog:execute-sql. \n - Boundary markers: There are no explicit delimiters or instructions provided to the agent to treat data from the PostHog API as untrusted or to ignore embedded instructions. \n
- Capability inventory: The skill allows the agent to execute shell commands (
git log), run SQL viaposthog:execute-sql, and perform write operations likeposthog:insight-createandposthog:annotation-create. \n - Sanitization: The scripts
scripts/breakdown_attribution.pyandscripts/compare_to_prior_periods.pyperform direct JSON parsing and mathematical operations on inputs without any validation or sanitization of string content.
Audit Metadata