quality-gates
Fail
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The file
scripts/assess-complexity.mdcontains templates that instruct the agent to execute shell commands using the$ARGUMENTSvariable directly (e.g.,find "$ARGUMENTS" -type f). This allows for arbitrary command injection if a user provides malicious input containing shell control characters. - [COMMAND_EXECUTION]: The skill employs dynamic context injection via the
!commandsyntax inscripts/assess-complexity.mdto run shell commands such aspwdandgit logat load time. This expands the execution surface and enables silent command processing. - [DATA_EXFILTRATION]: Automated analysis scripts such as
analyze-codebase.shandcount-dependencies.pyperform deep scans of the codebase to collect metrics on file structure and dependencies, exposing sensitive project metadata to the agent. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted codebase data (via
find,grep, andReadin analysis scripts) and processes it without boundary markers or sanitization. This is coupled with capabilities for shell command execution and memory management, allowing malicious file content to potentially influence agent behavior.
Recommendations
- AI detected serious security threats
Audit Metadata