kotlin-tuple
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to use several shell commands to achieve its goals, including
cpfor file copying,findfor directory searching,sedfor text replacement, and./gradlewfor build verification. It also involves modifying the project'sbuild.gradle.ktsfile to add dependencies. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it interpolates untrusted user input (such as package names and module names) directly into shell commands without defining sanitization or validation steps.
- Ingestion points: User-supplied parameters for 'Target module', 'Package name', and 'Maximum Tuple size' are used to construct file paths and shell commands in
SKILL.md. - Boundary markers: No delimiters or instructions to ignore embedded commands are used when processing these inputs.
- Capability inventory: The skill utilizes powerful capabilities including full file system access (read/write) and arbitrary shell command execution via the agent's environment.
- Sanitization: The instructions do not specify any validation or escaping logic for the user-provided strings before they are executed in the shell (e.g., within the
sedcommands inSKILL.md).
Audit Metadata