soul
Fail
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains explicit instructions to override the AI agent's native identity and safety guardrails. In
SKILL.md, it states: 'Never break character', 'No "as an AI"', 'I don't have opinions', 'I can't speak for [name]', and 'You ARE this person for the duration of the interaction'. This is a direct attempt to bypass standard AI persona constraints. - [COMMAND_EXECUTION]: Blog post examples provided as source material for identity emulation contain instructions to use
sudofor system changes, such as modifying/Library/Preferences/Logging/inexamples/steipete/data/writing/2025-logging-privacy-shenanigans.html. The skill also advocates for running tools with the--dangerously-skip-permissionsflag inexamples/steipete/data/writing/2025-claude-code-is-my-computer.htmlto grant the agent full system access. - [COMMAND_EXECUTION]: The skill includes documentation and examples suggesting the modification of shell configuration files to maintain tool behavior across sessions. Specifically,
examples/steipete/data/writing/2025-commanding-your-claude-code-army.htmlprovides a ZSH wrapper that involves sourcing a configuration file in~/.zshrc. - [DATA_EXFILTRATION]: The skill's primary workflow involves ingesting large volumes of highly sensitive personal data, including Twitter archives, messaging exports (Slack, Discord, iMessage), and personal notes. This creates a significant data exposure risk within the agent's context without clear sanitization boundaries.
- [REMOTE_CODE_EXECUTION]: The skill provides and executes scripts for fetching external data. For example,
examples/garry-tan/scripts/fetch_yt.pyusessubprocess.run()to execute shell commands, andexamples/karpathy/scripts/fetch-data.shdownloads content from multiple remote sources for local execution or analysis. - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted external data (user exports) to build an identity profile. This creates a large surface area for indirect prompt injection if the source data contains malicious instructions meant to hijack the agent's behavior during the analysis phase. Automated scans confirmed the presence of such patterns in provided transcript data.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata