core-researcher
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Potential shell injection in the
prehook. The script executesmemory_store "research_context_$(date +%s)" "$TASK". Since$TASKis derived from the user's input, an attacker can use shell metacharacters (e.g., backticks,$(), or;) to execute arbitrary commands on the host system. - DATA_EXFILTRATION (LOW): The skill combines local file access tools (
Read,Glob,Grep) with outbound network capabilities (WebFetch,WebSearch). While intended for research, this capability tier allows for the reading of sensitive local data and subsequent transmission to external domains. - PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8). It is designed to ingest and process untrusted data from external sources and local files without sanitization.
- Ingestion points: Data enters through
WebFetch,WebSearch, andReadtools. - Boundary markers: Absent; there are no instructions to the agent to ignore or delimit embedded commands within the fetched content.
- Capability inventory: High-impact tools including
Bash,Read, andWebFetchare available to the agent. - Sanitization: Absent; the skill lacks logic to filter or escape content before it is processed by the LLM or interpolated into the command hooks.
Recommendations
- AI detected serious security threats
Audit Metadata