researcher
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Several nodes in the workflow defined in
workflows/repo_analyzer.tomlare vulnerable to shell injection via user-controlled parameters. TheGitClonenode uses a string templateif [ ! -d '{{repo_dir}}' ]; then git clone '{{repo_url}}' '{{repo_dir}}'; fiwhich is executed in a shell environment. Therepo_urlandrepo_dirparameters are interpolated directly into the command string. An attacker can break out of the single quotes using shell metacharacters (e.g.,'and;) to execute arbitrary shell commands. TheDeepAnalyzenode interpolates theapproved_shardsJSON string directly into anechocommand:echo 'Starting deep analysis for shards: {{approved_shards}}'. Sinceapproved_shardsis provided by the user during theapproveaction, it can be crafted to escape theechocommand and execute malicious code. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. Untrusted data enters the system via the
TreeScannernode inworkflows/repo_analyzer.toml, which extracts the file tree of a remote repository. No boundary markers or instructions to ignore embedded instructions are used in theArchitectLLM prompt when processing the file tree data. The skill has capabilities for command execution and file system access (cloning repositories and harvesting results). File names and paths from the remote repository are passed directly to the LLM without sanitization. An attacker could embed malicious instructions in the file system structure of a repository to manipulate the agent's logic.
Recommendations
- AI detected serious security threats
Audit Metadata