skills/slamb2k/mad-skills/build/Gen Agent Trust Hub

build

Warn

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill automatically detects and executes test commands from project configuration files (e.g., package.json, pyproject.toml) during the 'Verify' stage (Stage 7). If an attacker provides a malicious project or compromises these files, the agent will execute arbitrary shell commands on the host system.
  • [PROMPT_INJECTION]: User-provided plans and codebase content are interpolated directly into subagent prompts without boundary markers (e.g., XML tags) or instructions to disregard embedded commands. This creates a surface for both direct and indirect prompt injection. 1. Ingestion points: PLAN argument and files read during Stage 1 and Stage 7 (SKILL.md, references/stage-prompts.md). 2. Boundary markers: Absent in all subagent templates. 3. Capability inventory: Subagents have access to Bash, Write, Edit, and Agent tools (SKILL.md). 4. Sanitization: No validation or sanitization is performed on external content before interpolation.
  • [EXTERNAL_DOWNLOADS]: The skill's pre-flight routine suggests installing dependencies using 'npx skills add slamb2k/mad-skills'. This involves fetching and running code from an external source managed by the author (slamb2k).
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 18, 2026, 01:13 PM