create-hook
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute a local Python script (scripts/scaffold.py) that handles the file system operations and template rendering. - [REMOTE_CODE_EXECUTION]: The
scaffold.pyscript generates executable Python files (execute.py) by populating templates with user-provided strings. Thecreate_skillfunction uses Python's.format()method to insert thedescriptionvariable into theexecute.py.jinjatemplate without escaping. This creates a risk where a malformed or malicious description could inject arbitrary code into the generated script if executed by a user. - [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface.
- Ingestion points: User input for
nameanddescriptioninSKILL.md. - Boundary markers: None present in templates like
SKILL.md.jinjaoragent.md.jinja. - Capability inventory: The generated skills typically include
Bash,Read, andWritecapabilities. - Sanitization: Name validation via regex
^[a-z0-9-]+$is present, butdescriptionis not sanitized. - [SAFE]: The skill performs regex-based name validation to prevent path traversal. It does not perform network operations or hardcode credentials.
Audit Metadata