operations-specialist

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (HIGH): An automated security scan (URLite) flagged a blacklisted URL associated with 'support.md'. This indicates a potential reference to a domain known for malicious activity, which could be exploited for data theft or unauthorized external communication.\n- [COMMAND_EXECUTION] (MEDIUM): The 'infrastructure-maintainer' agent in 'references/studio-operations_infrastructure-maintainer.md' is granted 'Bash' access to perform sensitive system tasks like firewall configuration and performance optimization. Without strict command validation or restricted environments, this provides a powerful vector for arbitrary code execution.\n- [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection via agents that process untrusted customer inquiries. Evidence Chain:\n
  • Ingestion points: Customer support inquiries and emails processed in 'references/studio-operations_support-responder.md' and 'references/databases_customer-support.md'\n
  • Boundary markers: Absent; untrusted user input is interpolated without delimiters or 'ignore' instructions\n
  • Capability inventory: 'Bash', 'Write', 'MultiEdit', and 'WebSearch' tools available to the agent\n
  • Sanitization: Absent; no input validation or filtering of external content is defined
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:14 PM