audit-plugin
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python auditor (
scripts/audit.py) and references theskills-refCLI tool to perform structural validation of plugin directories. This is legitimate behavior for a developer tool.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted files from the target directory. - Ingestion points:
scripts/audit.pyreads the contents ofREADME.mdandSKILL.mdfiles usingf.read()andf.readlines(). - Boundary markers: None. The raw text is read and displayed to the agent or evaluated for length and structure without isolation from instructions.
- Capability inventory: The agent has
Bash,Read, andWritepermissions and is specifically instructed inSKILL.mdto use these tools to 'fix compliance issues' based on the file contents. - Sanitization: No sanitization or instruction filtering is applied to the content of the files being audited.
Audit Metadata