return-stack
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is designed to perform "introspection without instrumentation" by reading untrusted external data to reconstruct its internal stack.
- Ingestion points: Uses
session_log,room_state,chat_context, andfile_timestampsas primary evidence sources in theDynamic Deoptimizationsection. - Boundary markers: Absent. The instructions encourage the LLM to "examine" and "synthesize" a virtual stack trace directly from the narrative trail without delimiters or safety warnings.
- Capability inventory: The skill is granted
read_fileandwrite_filepermissions. This creates a high-risk path where poisoned logs (containing instructions disguised as room descriptions or chat history) could trick the agent into performing unauthorized file writes when "restoring context." - Sanitization: None detected. The logic relies on "reconstructed causality" from potentially attacker-controlled session history.
- Data Exposure (LOW): The "Portable Journey" feature encourages saving and sharing the stack (which includes room paths and context) with others. If the navigation history contains sensitive file paths or data extracted via
read_file, this could facilitate accidental exposure.
Recommendations
- AI detected serious security threats
Audit Metadata