aile-subagent-dev
Fail
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The file
SKILL.mdcontains hardcoded absolute local paths (/Users/zhuchunlei/work/01_code/ailesuperpowers/skills/aile-subagent-dev/). This discloses the developer's local username and internal directory structure, which can be used to map the host environment.\n- [COMMAND_EXECUTION]: The skill implements a workflow that retrieves and executes 'Validation Commands' directly from external markdown files (analysis.mdandplan.md). Theimplementer-prompt.mdtemplate explicitly instructs sub-agents to run these commands on the system. Because these commands are sourced from project documentation that may be influenced by untrusted inputs, it allows for arbitrary command injection.\n- [PROMPT_INJECTION]: The skill uses external documentation as a core component of its orchestration logic without sanitization, creating a surface for indirect prompt injection. 1. Ingestion points: Loading and parsing ofdocs/plans/{Story-Key}/analysis.mdand associated plan files. 2. Boundary markers: None; the skill lacks delimiters or protective instructions to distinguish documentation from executable commands. 3. Capability inventory: Sub-agents (worker role) possess file-system write access and shell execution capabilities. 4. Sanitization: None; the content from documentation is directly interpolated into sub-agent Task Packages.
Recommendations
- AI detected serious security threats
Audit Metadata