lint-doc
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): In the file
rules/document-writing.md, the agent is explicitly instructed to 'Validate syntax with bq query', 'execute to confirm', and 'verify correctness by executing the code' for every edit within code blocks. This policy directs the agent to run potentially untrusted code found within documents. - [REMOTE_CODE_EXECUTION] (HIGH): The instruction to execute code from processed documents enables Remote Code Execution (RCE). Since the documents (ingestion points) can be modified by external actors or users, an attacker can embed malicious scripts that the agent will execute during its linting and verification workflow.
- [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a surface for indirect prompt injection by processing untrusted text. Ingestion points: Documents identified from context or provided file paths in
SKILL.md. Boundary markers: Modification exclusions are defined for backticks and quoted text inSKILL.md, but these do not prevent the LLM from interpreting instructions within the text itself. Capability inventory: The skill is authorized to perform shell execution viabq queryand arbitrary code execution for verification as specified inrules/document-writing.md. Sanitization: There is no evidence of sanitization or validation of the code content before the agent attempts execution.
Recommendations
- AI detected serious security threats
Audit Metadata