skills/simhacker/moollm/sister-script/Gen Agent Trust Hub

sister-script

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [Indirect Prompt Injection] (LOW): The skill possesses a data ingestion surface (reading procedures from documentation) and command execution capabilities (run_terminal_cmd). This creates a potential surface where untrusted input in a documentation file could influence subsequent automated actions. Evidence: DOCUMENT and FOLLOW methods in CARD.yml.
  • [Dynamic Execution] (LOW): The skill provides methods to generate and enhance Python CLI scripts based on textual procedures. While the provided examples use standard argparse templates, the capability to write executable code to the filesystem is a minor concern. Evidence: EXTRACT and ENHANCE methods in CARD.yml.
  • [Command Execution] (LOW): The skill explicitly requests the run_terminal_cmd tool. Although no dangerous commands are hardcoded in the skill itself, this provides the capability to execute arbitrary shell commands on the host environment.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:41 PM