golden-dataset
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection (the !command syntax) in
scripts/backup-golden-dataset.mdto run shell commands likefind,pwd, anddateautomatically upon skill loading to populate environment details in a backup script template. - [PROMPT_INJECTION]: Curation and annotation workflows described in
rules/curation-add-workflow.mdandreferences/annotation-patterns.mdinvolve fetching and processing content from external URLs (e.g., viaWebFetch), which introduces a surface for indirect prompt injection. Ingestion points:WebFetchusage for URL content extraction in documented curation pipelines. Boundary markers: Prompts use simple variable interpolation (e.g., {content_preview}) but lack robust delimiters or instructions to ignore embedded instructions within the data. Capability inventory: The skill is configured with access toRead,Glob,Grep,WebFetch, andWebSearchtools. Sanitization: No explicit sanitization or filtering of fetched external content is mentioned. - [DATA_EXFILTRATION]: The
scripts/backup-script.pyand associated documentation facilitate the bulk export of dataset content (including analysis findings, artifacts, and chunks) to JSON files, which represents a potential path for data exfiltration if triggered in a malicious context.
Audit Metadata