unit-executor
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill's primary purpose is to dynamically invoke and run other skills based on configurations found in
UNITS.csv. - Evidence: The
Proceduresection explicitly states 'Run the referenced skill'. - Risk: If an attacker can modify the local
UNITS.csv, they can trigger the execution of unintended skills or manipulate the parameters of existing ones. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection through its data ingestion pipeline.
- Ingestion points: Data is read from
UNITS.csv(unit names, inputs, outputs, and acceptance criteria). - Boundary markers: None present; the skill does not use delimiters to separate the instructions in the CSV from its own logic.
- Capability inventory: The skill can execute subprocesses (other skills) and modify workspace files (
UNITS.csv,STATUS.md). - Sanitization: No sanitization or validation of the content within
UNITS.csvis performed before processing or execution. - [DYNAMIC_EXECUTION] (MEDIUM): The
run.pyscript modifiessys.pathand dynamically imports thetooling.executormodule from a path calculated relative to the script's location. - Evidence:
sys.path.insert(0, str(repo_root))followed byfrom tooling.executor import run_one_unitinscripts/run.py.
Audit Metadata