subway
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
orders/index.jsis vulnerable to shell command injection. Themainfunction extracts a substring from theorder.timestampfield of a user-provided JSON file and passes it directly into a shell command executed viaexecSyncin theghfunction. An attacker can craft a malicioustimestampvalue (e.g.,"; touch /tmp/pwned; #") to execute arbitrary system commands with the privileges of the agent.\n- DATA_EXFILTRATION (HIGH): The skill performs unauthorized sensitive file access. TheparseEnvfunction inorders/index.jsattempts to read../../../.env. This path traversal targets environment files outside the skill's own directory, which often contain sensitive API keys, database credentials, or system secrets.\n- PROMPT_INJECTION (LOW): The skill presents an indirect prompt injection surface. 1. Ingestion points: Untrusted customer and order data from JSON files. 2. Boundary markers: None used when constructing the markdown output. 3. Capability inventory: Ability to post and update comments on GitHub repositories via theghCLI. 4. Sanitization: None; the script directly interpolates JSON fields likecustomerandsandwichinto markdown headers and tables, allowing an attacker to embed malicious instructions for downstream agents or users.
Recommendations
- AI detected serious security threats
Audit Metadata