create-symlink
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides templates for executing OS-level commands to manipulate the file system.
- Evidence: Commands such as
ln -s,mklink, andNew-Item -ItemType SymbolicLinkare provided inSKILL.mdandUSAGE.mdfor different operating systems. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by interpolating user-provided data into executable command templates.
- Ingestion points: User-provided 'source' and 'target' file paths (as described in
SKILL.mdandQUICK-REF.md). - Boundary markers: No delimiters or warnings are provided to prevent the agent from interpreting malicious characters within the paths.
- Capability inventory: Subprocess execution for PowerShell, CMD, and Bash commands.
- Sanitization: There is no mention of path validation, escaping, or sanitization to prevent command injection (e.g., using
;,&&, or|in paths).
Audit Metadata