troubleshoot
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is highly susceptible to indirect injection because it is designed to ingest and process data from the project directory. Ingestion points: Files within
spaces/[project]/,resources/research/, andideas/are accessed viaRead,Grep, andGlob. Boundary markers: No explicit markers are used to separate untrusted codebase content from the agent's instructions. Capability inventory: The skill usesBash,Write, andEdittools, allowing for arbitrary command execution and file system changes. Sanitization: No evidence of sanitization or filtering of ingested file content is present. - [Command Execution] (MEDIUM): The skill explicitly grants and utilizes the
Bashtool to execute shell commands such asnpm testandnpm run dev. This capability is a necessary feature for debugging but serves as an immediate vector for exploitation if the agent's logic is subverted through malicious content in the codebase. - [Data Ingestion Surface] (LOW): The skill's 'Research' phase involves extensive file system exploration, which increases the likelihood of encountering and processing maliciously crafted files or comments intended to influence the agent's behavior.
Recommendations
- AI detected serious security threats
Audit Metadata