rss-reader
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches RSS and Atom feeds from external web sources using
curland Python'surllib.request. It also suggests the installation of system packages likexmlstarletviaapt install.- [COMMAND_EXECUTION]: Utilizes multiple command-line utilities includinggrep,sed,xmlstarlet,xmllint,jq, andyqto process and filter XML data from the feeds.- [COMMAND_EXECUTION]: Dynamically executes a Python script using thepython3 -cflag to perform XML parsing using thexml.etree.ElementTreelibrary.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from external feeds. - Ingestion points: External feed URLs retrieved via
curlandurllib(SKILL.md). - Boundary markers: None; the skill processes fetched XML content directly without delimiters or instructions to ignore embedded commands.
- Capability inventory: Subprocess execution of shell utilities and Python scripts which could be targeted if a feed contains malicious escape sequences or payloads.
- Sanitization: There is no evidence of input validation or content sanitization for the data contained within the RSS items.
Audit Metadata