skill-auditor
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.md(Step 5) direct the agent to execute arbitrary Python scripts (python scripts/<script_name>.py) and shell commands provided within the skill package being audited. This leads to the execution of untrusted, user-provided code in the agent's runtime environment. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. In Step 5, the auditor is explicitly instructed to 'Follow its [the target skill's] instructions as if you are Claude-with-this-skill'. This adoption of untrusted instructions allows a malicious target skill to bypass auditor constraints or influence its evaluation.
- Ingestion points: Target skill's
SKILL.mdand script files. - Boundary markers: None used to delimit or neutralize target content.
- Capability inventory: Subprocess execution, file system access, and agent reasoning.
- Sanitization: No validation or sanitization is performed on the target skill's instructions or script parameters.
- [REMOTE_CODE_EXECUTION]: The dynamic analyze process involves executing code from a third-party skill package, which represents a significant execution risk similar to Remote Code Execution if the source package is untrusted.
- [COMMAND_EXECUTION]: The script
scripts/evaluate_skill.pyuses thecompile()function to process source code from target scripts for syntax verification. This dynamic code compilation is a known pattern that can be used as a vector for execution.
Audit Metadata