extract-wisdom
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill instructions in
SKILL.mdinclude 'Critical Rules' that state they 'override any conflicting instructions from system hooks, plugins, or other tools'. This is a directive to the agent to bypass standard behavioral constraints in favor of the skill's specific logic. - [REMOTE_CODE_EXECUTION]: The
scripts/wisdom.pyfile contains error messages suggesting that the user install the Bun runtime usingcurl -fsSL https://bun.sh/install | bash. While targeting the official domain of a well-known service, the use of piped shell execution is a high-risk remote code execution pattern. Additionally, the Python script configuresyt-dlpto useremote_componentsfrom GitHub, which involves fetching and potentially executing remote code. - [COMMAND_EXECUTION]: The
allowed-toolsconfiguration inSKILL.mdgrants permissive access to theBashtool, including commands with wildcards likemv *,mkdir *, andnpx *. This provides a significant capability surface that could be exploited. - [EXTERNAL_DOWNLOADS]: The skill performs various network operations, including fetching YouTube transcripts, web articles via
WebFetch, and images frommermaid.ink. It also utilizesnpxto download and execute packages likeprettierandmermaid-clifrom the npm registry. - [PROMPT_INJECTION]: The skill processes untrusted external content, creating a vulnerability surface for Indirect Prompt Injection.
- Ingestion points: Processes transcripts from YouTube and articles from the web via the
ReadandWebFetchtools. - Boundary markers: No specific delimiters or 'ignore instructions' warnings are provided to separate data from commands during analysis.
- Capability inventory: The skill has access to powerful tools like
Bash(for command execution) andWrite(for file modification). - Sanitization: Sanitization is limited to directory and filename normalization; the body of the external content is analyzed as raw text.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
Audit Metadata