agent-specification
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill employs execution hooks that interpolate user-controlled variables directly into shell-like commands.
- Evidence: The
prehook inSKILL.mdexecutesmemory_store "spec_start_$(date +%s)" "Task: $TASK". - Risk: If the platform evaluates these strings in a shell without proper escaping, the
$TASKvariable can be used to inject arbitrary shell commands. - [PROMPT_INJECTION]: The skill demonstrates a vulnerability surface for indirect prompt injection by ingesting untrusted data without boundary markers.
- Ingestion points: The
$TASKvariable is interpolated into theprehook inSKILL.md. - Boundary markers: There are no delimiters (e.g., XML tags or triple quotes) used to isolate the variable content.
- Capability inventory: The skill uses
echoandmemory_storeoperations which, while limited, are executed automatically upon skill invocation. - Sanitization: No sanitization, escaping, or validation logic is present to filter malicious instructions or shell metacharacters from the
$TASKinput.
Audit Metadata