object
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Dynamic Execution (CRITICAL): The skill documentation explicitly defines a 'Natural Language to Code' compilation pattern. Specifically, the
simulate,methods,guard, andeffectfields are intended to be transformed into executable closures. This pattern allows for the execution of arbitrary logic generated from untrusted text strings. - [Evidence]: The section 'Simulate — Object Update Loops' shows a 1:1 mapping from natural language strings to JavaScript
simulate_jsclosures. - Indirect Prompt Injection (HIGH): The skill is designed to process external object definitions (YAML). If an attacker provides a malicious YAML file, they can inject arbitrary commands into the
simulateoreffectfields. Since the agent is instructed to 'compile' these, it will execute the injected logic with its current tool permissions. - Ingestion points:
SKILL.md(YAML fields:simulate,methods,guard,effect). - Boundary markers: None. The instructions encourage a direct '1:1 mapping' without sanitization.
- Capability inventory:
read_file,write_file, and access to aworldobject with side effects likeemit(). - Sanitization: None provided. The skill relies on 'Self-Healing' code patterns which only address data corruption, not adversarial logic.
- Command Execution (HIGH): By instructing the agent to act as a compiler for the SIMANTICS protocol, the skill enables execution of commands through the agent's tool-calling interface. A malicious input like
effect: 'use write_file to delete the home directory'could be translated and executed. - Data Exfiltration (MEDIUM): Given the
read_fileandwrite_filepermissions combined with dynamic code generation, sensitive data from the file system could be read and then written to a public-facing directory or manipulated via theemitevent system.
Recommendations
- AI detected serious security threats
Audit Metadata