section-briefs
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script (
scripts/run.py) to automate the generation of section briefs. This script is invoked via a CLI command and operates on files within a specified workspace. - [PROMPT_INJECTION]: The skill exhibits vulnerability to indirect prompt injection because it processes content from external data files (
outline/chapter_skeleton.yml,outline/section_bindings.jsonl, andGOAL.md) which may be user-controlled or originate from untrusted sources. - Ingestion points: Data is read from
skeleton_path,bindings_path, andgoal_pathinscripts/run.py. - Boundary markers: Absent; the script does not use delimiters or include instructions for the agent to ignore embedded commands within the processed data.
- Capability inventory: The skill possesses file-system read and write capabilities within the provided workspace context.
- Sanitization: No input validation or sanitization is performed on the ingested content beyond standard JSON encoding for the output files.
- [DYNAMIC_EXECUTION]: The script
scripts/run.pydynamically modifies the Python search path (sys.path) to resolve and import thetooling.commonmodule relative to the repository root. While used for local dependency management, this involves runtime path computation.
Audit Metadata