difficult-workplace-conversations
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of six Markdown files (README.md, SKILL.md, and four files in the references/ directory). These files provide frameworks, advice, and templates for managing challenging conversations.
- Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'Override', 'DAN' prompts) were found in any of the files. The language is consistently instructional and helpful.
- Data Exfiltration: While the
SKILL.mddeclaresallowed-tools: Read, Glob, Grep, the content of the skill itself does not contain any instructions or code that would utilize these tools to access sensitive user data or exfiltrate it to external servers. There are nocurl,wget, or similar commands, nor any references to sensitive file paths in a malicious context. - Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, Unicode homoglyphs, or URL/hex/HTML encoding were detected in any of the Markdown files.
- Unverifiable Dependencies: The skill references other
.mdfiles within its ownreferences/directory, which are part of the skill's package. It also mentions 'Related Skills' which are references to other skills, not external code downloads or dependencies. No instructions for installing external packages or cloning repositories were found. - Privilege Escalation: There are no commands or instructions that would attempt to escalate privileges (e.g.,
sudo,chmod 777, modifying system files). - Persistence Mechanisms: No instructions for establishing persistence (e.g., modifying shell configuration files, creating cron jobs, or systemd services) were found.
- Metadata Poisoning: The
nameanddescriptionfields inSKILL.md, as well as the content ofREADME.md, are benign and accurately reflect the skill's purpose. - Indirect Prompt Injection: As a purely instructional skill, it does not process arbitrary external user input in a way that could lead to indirect prompt injection into its own logic. It provides guidance to the user, rather than being a system that processes untrusted data.
- Time-Delayed / Conditional Attacks: No conditional logic based on dates, usage, versions, or environment variables was found.
In conclusion, this skill is a static, informational resource and poses no security risks.
Audit Metadata