feature-verify
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to executecurlcommands that are assembled from variables such as{{ ENDPOINT }}and{{ PAYLOAD }}. This pattern of dynamic command construction is vulnerable to shell injection if input sources, like filenames in a git diff or values inenvironments.md, contain shell metacharacters. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from external sources.
- Ingestion points: Git diff outputs in
P1, API response bodies inP3, and log query results inP4. - Boundary markers: No explicit delimiters are specified to isolate untrusted data from the agent's instructions.
- Capability inventory:
Bash(used forcurl,git, and log queries),WebFetch,Grep,Glob,Task. - Sanitization: The instructions suggest redacting personal information in the final report but do not provide a mechanism for sanitizing data before it is processed or used in command assembly.
- [EXTERNAL_DOWNLOADS]: The skill performs network interactions via
curlandWebFetchto remote endpoints defined in the configuration. This functionality involves transmitting potentially sensitive authentication headers and processing content from external services.
Audit Metadata