skill-updater
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill uses multiple subprocess calls to execute shell commands like
ls,grep,git, andmake. This provides a direct path for arbitrary command execution if the skill is manipulated into running unauthorized commands. - DATA_EXFILTRATION (HIGH): The skill has broad read access to the file system (specifically the
squads/directory) and the ability to executegrepandgit. This combination could be used to search for and stage sensitive information for exfiltration. - Indirect Prompt Injection (HIGH): As a 'Skill Updater', this tool reads external
SKILL.mdfiles and applies changes to them. - Ingestion points: Reads
squads/*/SKILL.md,squads/TEAM.md, andsquads/_standards/*. - Boundary markers: None identified; it lacks delimiters to separate instructions from the data it processes.
- Capability inventory: Uses
ls,grep,git checkout,git add,git commit, andmake validate-allvia shell. - Sanitization: None identified; the skill directly processes and modifies files based on patterns it finds in existing content.
- Privilege Escalation (MEDIUM): The skill performs file system modifications and git operations (
git checkout -b,git add,git commit). While intended for its folder, an attacker could potentially redirect these operations to sensitive areas of the repository.
Recommendations
- AI detected serious security threats
Audit Metadata