eudic-to-anki
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_with_login_zsh.pyexecutes commands within a login shell (zsh -lic) to facilitate loading environment variables like API tokens. It employsshlex.quoteto sanitize inputs and prevent shell injection. - [COMMAND_EXECUTION]: The
scripts/ankiconnect_import.pyscript executes external audio generation tools via the--audio-commandparameter. It usesshlex.spliton the command template and executes viasubprocess.runwithshell=False, which effectively mitigates command injection risks. - [PROMPT_INJECTION]: The
references/word-coach-json-prompt.mdfile contains detailed instructions for a sub-agent to generate JSON data. While these are instructions for an LLM, they are intended for a controlled sub-agent environment to ensure data quality and formatting, rather than attempting to bypass the primary agent's safety filters. - [INDIRECT_PROMPT_INJECTION]: The skill processes data exported from the Eudic dictionary service. This data is subsequently processed by an LLM to generate Anki notes. While this represents a potential surface for indirect prompt injection if the user's dictionary data were to contain malicious instructions, the skill includes a validator (
scripts/validate_trvs_coach_json.py) that checks for data integrity and specific content quality markers.
Audit Metadata