operations-specialist
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): An automated security scan (URLite) flagged a blacklisted URL associated with 'support.md'. This indicates a potential reference to a domain known for malicious activity, which could be exploited for data theft or unauthorized external communication.\n- [COMMAND_EXECUTION] (MEDIUM): The 'infrastructure-maintainer' agent in 'references/studio-operations_infrastructure-maintainer.md' is granted 'Bash' access to perform sensitive system tasks like firewall configuration and performance optimization. Without strict command validation or restricted environments, this provides a powerful vector for arbitrary code execution.\n- [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection via agents that process untrusted customer inquiries. Evidence Chain:\n
- Ingestion points: Customer support inquiries and emails processed in 'references/studio-operations_support-responder.md' and 'references/databases_customer-support.md'\n
- Boundary markers: Absent; untrusted user input is interpolated without delimiters or 'ignore' instructions\n
- Capability inventory: 'Bash', 'Write', 'MultiEdit', and 'WebSearch' tools available to the agent\n
- Sanitization: Absent; no input validation or filtering of external content is defined
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata