ai-automation-workflows
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The
data_processing.shtemplate exhibits an indirect prompt injection surface. It reads files from a local directory usingcatand interpolates the raw content directly into a prompt for an LLM without using boundary markers or sanitization. - Ingestion points: Reads all
.txtfiles in./data/rawwithindata_processing.sh. - Boundary markers: None identified; file content is appended directly to the prompt string.
- Capability inventory: The skill utilizes subprocess execution, file system writes (
mkdir, output redirection), and network requests (curl). - Sanitization: No escaping or validation is performed on the ingested file content.
- [COMMAND_EXECUTION]: The documentation provides explicit instructions for modifying the system's
crontab. While consistent with the skill's purpose of automation, this establishes persistence by ensuring scripts run automatically at defined intervals. - [DATA_EXFILTRATION]: The
monitored_workflow.shexample demonstrates a pattern for sending internal execution results and error logs to an external webhook viacurl. This pattern could be adapted for silent data exfiltration. - [EXTERNAL_DOWNLOADS]: The skill references external resources for tool installation and expansion, including CLI installation via GitHub and adding additional skills via
npx. These are identified as vendor-provided resources.
Audit Metadata