java-developer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is highly susceptible to indirect prompt injection through external data ingestion.
- Ingestion points: The skill uses
Read,Grep, andGlobtools to process external files, specifically documented in the workflow: "Read the problem from leetcode_java/". - Boundary markers: There are no markers or delimiters defined to separate untrusted file content from the agent's instructions.
- Capability inventory: The skill is granted high-privilege tools including
Bash(system command execution) andWrite/Edit(file system modification). - Sanitization: No sanitization, filtering, or validation logic is present to handle instructions embedded within the processed files.
- [Command Execution] (MEDIUM): The skill explicitly allows the
Bashtool and instructs the agent to runmvn compileandmvn test. While standard for Java development, these tools provide a direct path for an attacker to execute arbitrary code if the agent is successfully compromised via prompt injection.
Recommendations
- AI detected serious security threats
Audit Metadata