journey-builder
Fail
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill mandates fetching content from a remote GitHub Gist (ID:
84a5c108d5742c850704a5088a3f4cbf) at the beginning of every session using thegh gist viewcommand.\n- [PROMPT_INJECTION]: The skill includes a 'Step 0' that forces the agent to read and apply instructions from an external, mutable source (the Gist). This is an indirect prompt injection vector, as the agent is told to 'Apply every relevant pitfall' to its work, allowing the Gist owner to influence the agent's actions remotely.\n- [DATA_EXFILTRATION]: The skill utilizes thegh gist editcommand to allow the agent to upload data to a remote Gist. If the agent is influenced by malicious instructions from the Gist, this mechanism could be used to exfiltrate sensitive code or project data.\n- [COMMAND_EXECUTION]: The skill performs multiple shell operations includingfind,cp,xcodegen, andxcodebuildto manipulate the project environment and execute code.\n- [REMOTE_CODE_EXECUTION]: The skill triggers the execution of UI tests viaxcodebuild test. Because the agent is instructed to write and implement real code based on potentially remote instructions, this represents a risk of arbitrary code execution on the host machine.\n- [PRIVILEGE_ESCALATION]: The skill explicitly directs the agent to disable the macOS app sandbox (ENABLE_APP_SANDBOX: "NO") and remove sandbox entitlements in the project configuration, which weakens the system's security boundaries for the application being tested.
Recommendations
- AI detected serious security threats
Audit Metadata