seed-hypermedia-read
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudowith system package managers (e.g.,apt-get,dnf,pacman) to install thegrpcurlutility during prerequisite setup. - [COMMAND_EXECUTION]: The skill captures output from a
grpcurlcommand into a shell variable and interpolates that variable directly into the JSON payload of a subsequent shell command. This pattern creates a shell injection risk if the data returned by the server contains malicious characters intended to break out of the string context. - [EXTERNAL_DOWNLOADS]: Provides instructions to download
grpcurlbinaries from the official FullStory GitHub repository. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from external gRPC endpoints.
- Ingestion points: Data retrieved from gRPC server methods (stored in variables like
RESULTandVALUE). - Boundary markers: No boundary markers or delimiters are used to differentiate untrusted server data from the agent's instructional context.
- Capability inventory: The skill possesses the capability to execute shell commands (
grpcurl,curl,jq) and write files to/tmp. - Sanitization: There is no evidence of sanitization, escaping, or validation of the variables extracted from gRPC responses before they are used in downstream shell execution.
Audit Metadata