write-script-csharp
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill provides a C# script template that ingests untrusted data from an external source.
- Ingestion points: The example script takes a
urlparameter in theMainmethod. - Boundary markers: The template lacks delimiters or instructions to ignore embedded commands in the fetched content.
- Capability inventory: The script uses
RestSharpfor network requests andNewtonsoft.Jsonfor deserialization, and returns the result to the caller (Windmill/Agent context). - Sanitization: No input validation or content filtering is shown in the provided pattern, allowing malicious remote content to influence the agent's downstream reasoning or actions.
- Command Execution (LOW): The skill instructs the agent to execute local CLI commands for metadata generation and deployment.
- Evidence: Usage of
wmill script generate-metadataandwmill sync pushin the instructions. - External Downloads (LOW): The instructions reference the use of external NuGet packages and a specific CLI tool.
- Evidence: Usage of
#r "nuget: ..."directives forNewtonsoft.JsonandRestSharpand references to thewmillCLI tool. - Trust Scope: These are standard packages from the official NuGet gallery, but their use indicates a dependency on external, remotely-hosted code.
Audit Metadata