mine-plugins
Warn
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's execution steps involve running
python3 "scripts/inventory_plugin.py" --path "$ARGUMENTS" --format jsonwhere the$ARGUMENTSvariable is directly interpolated into a shell command. This creates a risk of command injection if the user input contains shell metacharacters such as semicolons, backticks, or command substitution sequences. - [EXTERNAL_DOWNLOADS]: The skill provides instructions to run
pip install -r ./requirements.txt. This triggers the download and installation of external Python packages from public registries, creating a dependency on remote code. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it is designed to 'read every file completely' within a user-provided directory during the analysis phase. It lacks boundary markers or instructions to ignore embedded commands, allowing malicious instructions inside analyzed files to potentially hijack the agent's behavior. * Ingestion points: Every file located within the directory tree provided in the
$ARGUMENTSpath. * Boundary markers: Absent; the agent is instructed to read all content without delimiters. * Capability inventory: Access to theBashandWritetools provides a significant impact path for any successful injection. * Sanitization: No sanitization or validation of the external file content before it is processed by the agent.
Audit Metadata