eae-sln-overview
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill is designed to ingest and summarize data from EcoStruxure Automation Expert (EAE) projects, creating a significant surface for indirect prompt injection attacks.
- Ingestion points: The skill reads a wide variety of project files, including
*.doc.xml(documentation),*.fbt(function blocks),System.sys(topology), andREADME.md. These files are typically user-controlled or attacker-controlled if the project is sourced from the internet. - Boundary markers: Absent. The
analyze_project.pyscript does not implement any delimiters or "ignore instructions" tags to prevent the AI from obeying instructions found within the parsed data. - Capability inventory: The script performs extensive file-system reads within the target directory and has the ability to write reports to the local filesystem via the
--outputparameter. - Sanitization: No sanitization or filtering of the extracted text (particularly from documentation and descriptions) is performed before it is included in the markdown or JSON output.
- Unverifiable Dependencies (LOW): The orchestrator script
analyze_project.pyattempts to import nine local modules (e.g.,parse_solution,parse_system_topology,calculate_quality) that are listed inSKILL.mdbut are not provided in the skill package files. This prevents a thorough security review of the actual parsing and analysis logic performed by the tool.
Audit Metadata