sancai-zhen

Warn

Audited by Gen Agent Trust Hub on Apr 2, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill defines an 'Autonomous Execution Protocol' in di/SKILL.md that explicitly instructs the agent to 'directly enter execution, do not wait for confirmation' if confidence exceeds 85%. It lists high-impact activities such as scanning existing code, creating modules, migrating call points, and updating tests as operations to be performed without user intervention.
  • [PROMPT_INJECTION]: In SKILL.md, the skill uses directive language to override standard agent-user interaction patterns, stating that 'routing is internal' and 'not exposed to the user'. This encourages the agent to suppress transparency and prioritize its internal state transitions over user visibility.
  • [COMMAND_EXECUTION]: The skill contains logic in tian/SKILL.md and ren/SKILL.md to automatically modify local data files (graph.json, zhen-log.json) and generate 'evolution' suggestions that modify the skill's own operational rules.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted 'seeds' from user input in tian/SKILL.md, stores them in a persistent knowledge graph, and later processes these stored inputs as the basis for autonomous code execution in di/SKILL.md without sanitization or boundary markers. • Ingestion points: tian/SKILL.md (Step 1
  • Receive seed). • Boundary markers: Absent. The skill lacks instructions to delimit or ignore embedded commands within user-provided seeds. • Capability inventory: di/SKILL.md (Code refactoring, module creation, and test modification capabilities). • Sanitization: Absent. There is no evidence of filtering or validation for the content of seeds before they are used to drive execution logic.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 2, 2026, 04:56 AM