signalr
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): High risk for Indirect Prompt Injection due to the combination of untrusted data ingestion and high-privilege capabilities. 1. Ingestion points: The skill uses
mcp__context7__query-docsto fetch external content from documentation sources (SKILL.md). 2. Boundary markers: Absent; there are no instructions to delimit or ignore instructions within the fetched data. 3. Capability inventory: The skill is grantedBash,Write, andEdittools (SKILL.md). 4. Sanitization: Absent. An attacker who poisons the external documentation source could potentially achieve command execution or file modification by embedding malicious instructions that the agent then follows using its elevated privileges. - CREDENTIALS_UNSAFE (MEDIUM): Insecure credential handling pattern. Both
SKILL.mdandreferences/workflows.mdprovide implementation examples that pass JWT tokens via theaccess_tokenquery parameter. This practice is a security risk as it exposes sensitive credentials in server access logs, proxy logs, and browser history. - COMMAND_EXECUTION (INFO): The skill requests broad system access. Evidence: The YAML frontmatter in
SKILL.mdexplicitly listsBashandWriteinallowed-tools. While requested for implementation and testing, this capability significantly increases the potential impact of an injection attack.
Recommendations
- AI detected serious security threats
Audit Metadata