odoo-report
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides explicit instructions for environment setup using
sudo(e.g.,sudo apt-get install wkhtmltopdf) while theBashtool is explicitly permitted in theallowed-toolssection. This configuration encourages the agent to execute commands with elevated privileges on the host system to fulfill the skill's primary purpose of setting up dependencies. - [PROMPT_INJECTION]: The skill is designed to ingest and analyze untrusted data in the form of Odoo XML and HTML templates (via
Read,Glob, andGreptools). This creates a surface for indirect prompt injection where malicious instructions embedded in a processed template could potentially influence the agent's behavior, especially given its capabilities for file modification and command execution. - Ingestion points: Processes
mail.templateandir.actions.reportrecords and XML files from the Odoo codebase. - Boundary markers: The skill includes a "SECURITY VALIDATION" checklist instructing the agent to look for unsafe
eval()orexec()calls within the templates, which serves as a security-oriented boundary check. - Capability inventory: Access to
Bash,Write,Edit,Glob,Grep, andWebFetchtools. - Sanitization: The skill does not explicitly detail how the agent should sanitize the ingested content before processing, although it advises checking for unsafe patterns in the data itself.
Audit Metadata