edge-hint-extractor
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/build_hints.pyusessubprocess.runto execute an external command provided through the--llm-ideas-cmdcommand-line argument. Whileshlex.splitis employed to parse the command string, the execution of arbitrary user-provided commands is a sensitive operation that could be exploited if the argument is influenced by an attacker. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting untrusted data from external files and passing it to an external process. Findings include:
- Ingestion points: Data is read from
market_summary.json,anomalies.json, andnews_reactions.csv(or.json) via theread_market_summary,read_anomalies, andread_news_reactionsfunctions inscripts/build_hints.py. - Boundary markers: There are no boundary markers or instructions to the downstream tool to ignore embedded instructions within the processed data.
- Capability inventory: The script executes subprocesses via
subprocess.runin thegenerate_llm_hintsfunction. - Sanitization: There is no evidence of sanitization or filtering of the textual content before it is passed to the external command.
Audit Metadata