competitor-teardown
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
infshCLI to execute various research and analysis tasks, which is permitted and scoped by theallowed-toolsmanifest configuration. - [EXTERNAL_DOWNLOADS]: Provides links to external documentation and installation scripts on GitHub for the inference-sh toolset.
- [REMOTE_CODE_EXECUTION]: Uses the
infsh/python-executorto run Matplotlib code for generating positioning maps, which involves dynamic code execution. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it fetches and processes untrusted data from external websites, search engines, and review platforms. Ingestion points:
infsh/agent-browser,tavily/search-assistant,exa/search, andtavily/extractinSKILL.md. Boundary markers: Absent. Capability inventory: includes shell command execution viainfsh, browser automation, and Python code execution. Sanitization: No sanitization of the retrieved external content was identified.
Audit Metadata