askprisma

Warn

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (MEDIUM): The skill dynamically locates and executes a Python script ('generate_report.py') using a 'find' command in the user's home directory. This constitutes loading and executing code from a computed path.
  • Evidence: SKILL.md Phase 5 uses 'REPORT_SCRIPT=$(find ~/.claude/skills/askprisma/scripts ... -name generate_report.py ...) ; python "$REPORT_SCRIPT"'.
  • Risk: An attacker with local write access to these paths could place a malicious script that the agent would then execute with user privileges.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): The skill instructs the agent to install missing Python libraries at runtime using pip.
  • Evidence: SKILL.md Phase 3 states 'install missing packages with pip if needed'. Coding-patterns.md states 'If a library is missing: pip install library_name'.
  • Risk: This could lead to the installation of malicious packages via dependency confusion or typosquatting attacks if the agent incorrectly identifies a package name.
  • [PROMPT_INJECTION] (LOW): The skill processes untrusted external data (CSV, Excel, SQL) and interpolates it into analysis and reports without sanitization or boundary markers (Indirect Prompt Injection).
  • Ingestion points: 'pd.read_csv', 'pd.read_sql', and glob-based file discovery in 'coding-patterns.md'.
  • Boundary markers: Absent. No instructions to use XML delimiters or safety warnings for data processing.
  • Capability inventory: Shell command execution, Python execution (via Bash), and local script execution.
  • Sanitization: None mentioned for data content or the generated JSON report input.
  • Risk: Maliciously crafted data files could attempt to influence the agent's behavior or inject malicious content into generated PDF reports.
  • [REMOTE_CODE_EXECUTION] (MEDIUM): The combination of 'pip install' and the execution of dynamically discovered scripts allows for the introduction and execution of code not originally packaged with the skill.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 19, 2026, 03:15 PM