notebook
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Path traversal vulnerability in the type definition command. The
type-addcommand incli.jsaccepts user-defined type names without sanitization. These names are subsequently used as path components inlib/store.js(getObjectPath), enabling the creation of directories and YAML files, as well as the deletion of existing files, outside thenotebook/directory and potentially across the broader workspace. - [PROMPT_INJECTION]: Indirect prompt injection surface identified in the data retrieval workflow. The skill stores user-provided text in YAML files which are later read and processed by the agent to generate questions or display information.
- Ingestion points: CLI arguments for the
addandeditcommands incli.jsstored vialib/store.jsfunctions. - Boundary markers: No delimiters or instructional guards are present when content is retrieved and presented to the agent in the
expandandgetcommands. - Capability inventory: File system read, write, and delete operations restricted to the workspace.
- Sanitization: No validation or filtering is performed on stored content to prevent the inclusion of malicious instructions.
- [EXTERNAL_DOWNLOADS]: The
package-lock.jsonfile specifies version13.0.0for theuuidpackage. This version is not currently available on the official NPM registry for the standarduuidlibrary, which represents an anomalous dependency configuration.
Audit Metadata