create-command
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill uses the
${ARGUMENTS}placeholder to ingest user input, which is then used to generate a new command file. This pattern creates a vulnerability to indirect prompt injection, as malicious input could be designed to override the instructions of the resulting command.\n - Ingestion points: The
${ARGUMENTS}variable inSKILL.md.\n - Boundary markers: None identified; the input is placed directly into the goal section of the generated content.\n
- Capability inventory: The skill allows
WriteandBashoperations.\n - Sanitization: No explicit sanitization or validation of the input content is performed.\n- [COMMAND_EXECUTION]: The skill is granted
Bashtool access. Although intended for development tasks like linting and testing, this provides a capability that could be exploited if the agent is misled by malicious instructions.
Audit Metadata