searching-web
Fail
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The fallback script
scripts/web-search.shexecutes thegeminiCLI tool with the--yoloflag. This flag is specifically designed to bypass interactive safety confirmations and security guardrails, allowing the sub-tool to perform operations autonomously without human review.- [PROMPT_INJECTION]: The scriptweb-search.shdirectly interpolates the$SEARCH_QUERYvariable into a prompt template without any sanitization or boundary markers (such as XML tags or 'ignore' instructions). This allows a malicious query to override the intended search task and manipulate the behavior of the Gemini sub-agent.- [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection by processing untrusted data from web searches. Ingestion points: External content enters the system via Exa results and theSEARCH_QUERYargument inweb-search.sh. Boundary markers: No delimiters or safety warnings are present to isolate untrusted content. Capability inventory: The skill can execute shell commands viascripts/web-search.shand perform extensive web crawling. Sanitization: No filtering or escaping is applied to external data before it is passed to the AI models.
Recommendations
- AI detected serious security threats
Audit Metadata