escalation
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to use shell commands to write escalation records to a local file. This pattern is vulnerable to command injection if user-provided input is not properly escaped before being included in the command.
- Evidence: The skill uses
echo 'JSON_STRING' >> .golem/escalations.jsonlinSKILL.mdas a template for logging. - Risk: An attacker could craft a request that breaks out of the single-quoted string (e.g., by including
' && command #) to execute arbitrary shell commands on the system. - [DATA_EXFILTRATION]: While no direct exfiltration logic is present, the potential command injection vulnerability allows an attacker to execute network commands (like
curlorwget) to send sensitive local data to a remote server. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it processes and stores untrusted user input.
- Ingestion points: User requests and context entering the agent through the escalation logic described in
SKILL.md. - Boundary markers: Absent; there are no delimiters or instructions to ignore malicious content within the recorded data.
- Capability inventory: File system writing via the shell (
SKILL.md). - Sanitization: Absent; the instructions do not require the agent to sanitize or validate the content of the
reasonorcontextfields before writing them.
Audit Metadata