background-process-run-command-sync
Warn
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill defines a tool
run_command_syncthat takes acommandstring and executes it directly in a shell environment. This capability allows an agent or an attacker to perform any action the underlying user account is permitted to do, including modifying system files or installing malicious software. - Evidence: The
argumentsschema inSKILL.mdrequires acommandproperty of typestringwith no validation patterns or allowed-lists. - [DATA_EXFILTRATION]: The skill is designed to return the full output of the executed command back to the agent. This facilitates the reading of sensitive files such as SSH keys, environment variables, or application secrets if the provided command targets those files.
- Evidence: The tool description explicitly states it "returns full output" of the synchronous shell command.
- [PROMPT_INJECTION]: The skill presents a high vulnerability surface for indirect prompt injection because it ingests untrusted strings into a high-privilege execution environment (shell). A malicious input could result in the execution of secondary payloads.
- Ingestion points: The
commandargument inSKILL.md. - Boundary markers: None present; the command is passed directly to the execution manager.
- Capability inventory: Shell execution via
run_command_syncwith the ability to return results. - Sanitization: None provided in the skill definition.
Audit Metadata