blog-analytics
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The
importcommand intools/TrackPerformance.tsallows the agent to read arbitrary files from the local filesystem. By providing a path as an argument toimportMetrics, the script performs areadFileSyncwithout validating that the path is within the intended workspace. \n- Dynamic Execution (MEDIUM): Themonthparameter used in thelogandlistcommands oftools/TrackPerformance.tsis vulnerable to path traversal. The script uses this input inpath.joinandmkdirSyncwithout sanitization, which could allow the creation of directories or writing of files outside the designated analytics directory. \n- Indirect Prompt Injection (LOW): The skill is susceptible to indirect prompt injection (Category 8). \n - Ingestion points: Metric data is ingested via CLI arguments (log command) and external JSON files (import command). \n
- Boundary markers: None are present to distinguish between data and instructions. \n
- Capability inventory: The script has full read/write access to the local filesystem within the agent's permission scope. \n
- Sanitization: Input strings such as blog titles, topics, and metric data are processed without sanitization or escaping, potentially allowing malicious data to influence agent behavior during insight generation.
Audit Metadata