aristotle-emulator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8) due to its core design of processing untrusted inputs and having execution capabilities. \n
- Ingestion points: The
$ARGUMENTSvariable (containing theorem statements and proof outlines) is processed in Step 1 and Step 2 of the workflow. \n - Boundary markers: None. Untrusted input is directly interpolated into file comments and analyzed for code generation without delimiters. \n
- Capability inventory: Access to the
shelltool (to runlake build) andfiletool (to writelean_proof.lean). In Lean 4, the compilation process can execute arbitrary code during elaboration via tactics or the IO monad. \n - Sanitization: No sanitization or validation of the input theorem/outline is performed. \n- [COMMAND_EXECUTION] (MEDIUM): The skill executes
lake buildvia the shell. While this is the intended functionality for a Lean assistant, it executes code derived from untrusted user input, which can be exploited if the user provides malicious Lean code snippets disguised as a theorem.
Recommendations
- AI detected serious security threats
Audit Metadata