workflow-markdown
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
executeShellStepfunction inlib/executor.jspasses code strings directly tochild_process.exec. These strings are modified by thesubstituteVariablesfunction inlib/parser.jsusing a simple regex replacement of user-provided values. An attacker can inject arbitrary shell commands (e.g., using;,&&, or|) through these variables, as no escaping or validation is performed. - [REMOTE_CODE_EXECUTION]: The skill dynamically generates and executes JavaScript and Python scripts in
executeJavaScriptStepandexecutePythonStepwithinlib/executor.js. Any variable interpolation within these blocks allows for arbitrary code injection into the runtime environment, as the code is written to a temporary file and executed via the system'snodeorpython3interpreter. - [DATA_EXFILTRATION]: The unrestricted command execution capability allows the skill to read any file the agent has access to, such as
~/.ssh/id_rsaor.envfiles, and transmit them to external servers via shell commands likecurlorwget. The example workflows inSKILL.mdexplicitly demonstrate the use ofcurlwith variable substitution. - [PROMPT_INJECTION]: The skill is highly vulnerable to indirect prompt injection.
- Ingestion points: Workflow files are discovered and read from local project directories such as
.agent/workflows/inlib/workflows.js. - Boundary markers: The system lacks any markers or "ignore embedded instructions" warnings, meaning the agent will treat all content in discovered markdown files as authoritative commands.
- Capability inventory: The skill exposes a powerful suite of capabilities including arbitrary shell execution, file system modification, and runtime code execution across multiple languages.
- Sanitization: There is no sanitization, escaping, or validation of either the markdown content or the variables interpolated into executable blocks.
- [DECEPTIVE_CLAIMS]: The
SKILL.mddocumentation contains false security claims, stating that "Shell commands are validated before execution" and "Dangerous patterns flagged for review". A technical audit of the source code confirms that no such validation or filtering logic exists, which could lead a user to misjudge the skill's safety profile.
Recommendations
- AI detected serious security threats
Audit Metadata