spets
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches and runs the
spetspackage from the npm registry using thenpxcommand during skill initialization. - [REMOTE_CODE_EXECUTION]: The skill architecture defines a loop where the agent executes instructions and commands provided by an external orchestrator, effectively allowing remote control of the agent's behavior.
- [COMMAND_EXECUTION]: Executes shell commands via
npxand is instructed to run commands found in theonCompletefield of the orchestrator's JSON response. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes and follows instructions from an external tool without validation.
- Ingestion points: JSON output returned from the
npx spetscommand in SKILL.md. - Boundary markers: No delimiters or ignore-instructions warnings are used for the external content.
- Capability inventory: Shell execution (
npx), file system interaction, and general agent capabilities. - Sanitization: No validation or sanitization of the remote
promptoronCompletefields before execution.
Audit Metadata