skill-tuning
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Unsafe shell command construction is present in multiple files. In
phases/actions/action-init.md, the variableskillPath(obtained directly from user input viaAskUserQuestion) is interpolated into aBash()call:Bash("cp -r \"${skillPath}\"/* \"${backupDir}/\""). A malicious user providing a path with shell metacharacters (e.g.,\"; touch /tmp/pwned; #\") could execute arbitrary commands. \n- COMMAND_EXECUTION (HIGH): The skill is vulnerable to command injection through target skill metadata. Inphases/actions/action-abort.md, the restoration commandBash("cp -r \"${state.backup_dir}/${targetSkill.name}-backup\"/* \"${targetSkill.path}/\"")usestargetSkill.name, which is read from theSKILL.mdfile of the skill being tuned. A malicious skill can exploit this by including shell commands in its name field. \n- REMOTE_CODE_EXECUTION (HIGH): The filephases/actions/action-gemini-analysis.mdexecutes a CLI tool (ccw cli) with a prompt derived fromstate.user_issue_description. TheescapeForShellutility function only escapes double quotes, dollar signs, and backticks, failing to handle other shell metacharacters like semicolons, pipes, or ampersands. Furthermore, thestate.target_skill.pathvariable used in the same command is not escaped at all. \n- DATA_EXFILTRATION (SAFE): No evidence of unauthorized data transmission was found. The skill accesses local files as part of its primary tuning and diagnosis purpose, and network activity is limited to the expected external analysis tool.
Recommendations
- AI detected serious security threats
Audit Metadata