meeting-summary
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The
dependency.systemfield inSKILL.mdexecutes a shell command (mkdir -p /tmp/openskills-uploads) during environment setup. Allowing arbitrary shell commands in metadata is a dangerous pattern that can be exploited for RCE if the skill source is untrusted. - [PROMPT_INJECTION] (HIGH): The skill is susceptible to Indirect Prompt Injection (Category 8) because it processes untrusted meeting data and has write capabilities.
- Ingestion points: Meeting records provided by the user in the main prompt flow.
- Boundary markers: Absent. The prompt instructions do not use delimiters or instructions to ignore embedded commands within the meeting notes.
- Capability inventory: File system write access via the
scripts/upload.pyscript. - Sanitization: None. The agent does not sanitize the input before passing it to the upload script, allowing an attacker to manipulate the file-writing process.
- [COMMAND_EXECUTION] (HIGH): Path Traversal vulnerability in
scripts/upload.py. The script accepts afilenamedirectly from its input JSON and concatenates it to a base path usingoutput_dir / filename. Without sanitization, an attacker could provide a path like../../home/user/.ssh/authorized_keysto overwrite sensitive files or achieve persistence.
Recommendations
- AI detected serious security threats
Audit Metadata