skill-creator
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Command Execution] (MEDIUM): Path Traversal vulnerability in initialization logic.
- Evidence: In
scripts/init_skill.py, the variableskill_pathis constructed usingos.path.join(squads_dir, name), wherenameis a raw command-line argument. A user could provide a relative path like../../some-sensitive-dirto create directories and files outside of the intendedsquads/directory. - [Data Exposure] (LOW): Hardcoded developer environment paths.
- Evidence: Scripts
scripts/add_config_awareness.pyandscripts/add_mcp_awareness.pycontain hardcoded absolute paths:/Users/yuranikolaev/Developer/antigravity/ag-skill-factory/squads. This leaks the developer's local username and file structure. - [Indirect Prompt Injection] (LOW): Susceptibility to injection via unvalidated template variables.
- Ingestion points:
scripts/init_skill.pyaccepts<skill-name>and populatesSKILL.mdtemplates. - Boundary markers: None.
- Capability inventory: File writing, directory creation, and shell script generation.
- Sanitization: No validation or escaping is performed on the
nameargument before it is used in path construction or string replacement within the skill template.
Audit Metadata