chip-manual
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The script
scripts/query_manual.pyis vulnerable to indirect prompt injection. User-supplied input from thequestionargument is directly interpolated into a system prompt for the Gemini API using f-strings. This allows a user to potentially bypass the established 'Strict Rules' and influence the behavior of the chip manual query assistant. - Ingestion points: The
questioncommand-line argument inscripts/query_manual.py. - Boundary markers: While the manual content is delimited, the user-provided question is included following a simple label without any escaping or isolation from the instructions.
- Capability inventory: The skill environment has access to powerful tools including
Read,Write,Edit, andBash. The query script itself performs network requests to the Gemini API. - Sanitization: No input validation, escaping, or sanitization is performed on the user's question before it is used to construct the prompt.
Audit Metadata