council-oracle
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes external command-line tools
geminiandcodexusing Python'ssubprocess.runmethod. This is the intended functionality to perform parallel analysis across different AI models. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by interpolating untrusted data into instructions for external LLMs.
- Ingestion points: User-provided questions and content from local files (read via Read, Grep, or Glob tools) are passed to
scripts/codex-oracle.pyandscripts/gemini-oracle.pyvia the--questionand--context-filearguments. - Boundary markers: The scripts use text-based delimiters like
----- BEGIN: {path} -----to separate context files, which are helpful but can be subverted by adversarial content within the files. - Capability inventory: The skill can execute shell commands (via
subprocess), perform web searches (WebSearch), and fetch external web content (WebFetch), providing a significant impact area if the agent is misled by injected instructions. - Sanitization: There is no evidence of sanitization or filtering of the input strings before they are embedded into the prompt templates, meaning an attacker-controlled file in the codebase could potentially hijack the 'oracle' persona to provide biased or malicious advice.
Audit Metadata