todo-tracker
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/todo.shcontains a shell command injection vulnerability. User-provided input (such as task names or search patterns) is passed as arguments to the script and then evaluated within double-quoted strings in commands likegrepandsed. For example, themark_doneandremove_itemfunctions use the$patternvariable inside a double-quoted string:grep -q "- \[ \].*$pattern". If a string containing shell metacharacters like$()or backticks is provided, the shell will execute the embedded commands during script execution. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting and storing untrusted user content in the
TODO.mdfile, which is later read back into the agent's context. 1. Ingestion points: User-provided task descriptions and search patterns are stored inTODO.mdand passed as command-line arguments as defined inSKILL.md. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present when the agent reads theTODO.mdfile. 3. Capability inventory: The skill executes subprocesses via thebashinterpreter as defined inSKILL.md. 4. Sanitization: The skill performs no validation, escaping, or sanitization of input strings before they are used in shell commands or written to the filesystem.
Recommendations
- AI detected serious security threats
Audit Metadata