advanced-guardrails
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The file
scripts/create-guardrails-config.mduses the!prefix to trigger shell command execution on the host system. It executes utilities such asgrep,find, anddateto dynamically populate configuration fields. - [CREDENTIALS_UNSAFE] (HIGH): The shell commands in
scripts/create-guardrails-config.mdare specifically designed to read from.envfiles, which are standard locations for storing sensitive credentials like API keys and database passwords. Accessing these files via shell grep operations is a dangerous pattern that can lead to credential leakage. - [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection through the
$ARGUMENTSparameter and the content of the files it reads. 1. Ingestion points:$ARGUMENTSvariable and contents of.envfiles. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present in the processing logic. 3. Capability inventory: The skill possesses the capability to execute arbitrary shell commands via the!syntax. 4. Sanitization: There is no evidence of sanitization or validation for the input data before it is processed by the shell or included in the output.
Recommendations
- AI detected serious security threats
Audit Metadata