migrate
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill contains a file named
docswith the content../../../docs. This relative path reference suggests an attempt to access documentation or source files located several levels above the skill's own directory, which constitutes a path traversal risk and could lead to unauthorized file access depending on the execution environment.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It processes user-supplied code or function names and uses them to construct search and read paths for tools such asRead,Grep, andGlob. This can be exploited by an attacker providing crafted function names containing path traversal sequences to read sensitive files from the system.\n - Ingestion points: The
$ARGUMENTSinput defined inSKILL.md.\n - Boundary markers: The skill lacks boundary markers or instructions to isolate user input from the file path construction logic.\n
- Capability inventory: The agent utilizes
Read,Grep, andGlobcapabilities, which are directly influenced by the processed arguments.\n - Sanitization: There is no evidence of sanitization or validation to prevent directory traversal sequences in the extracted function names.
Audit Metadata