alibabacloud-iqs-weather-query
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill implements a "Continuous Evolution" mechanism via the
evolveHintfield inscripts/weather.mjsand instructions inSKILL.md, which explicitly prompt the agent to write new JavaScript parser functions and register them in the script'sPARSER_REGISTRY. - [COMMAND_EXECUTION]: This design encourages the generation and integration of executable code based on untrusted data retrieved from external weather websites using the
ReadPageBasicAPI. This creates a risk where malicious web content could influence the agent to insert unintended or harmful code into thescripts/weather.mjsfile. - [PROMPT_INJECTION]: Indirect Prompt Injection Surface:
- Ingestion points: External content enters the agent context through the
rawTextfield inscripts/weather.mjs, which contains scraped text from weather websites. - Boundary markers: The script uses a basic natural language
hintto guide the agent but lacks robust structural delimiters to isolate untrusted web content from the agent's instructions. - Capability inventory: The agent is explicitly directed to modify its own source code (
scripts/weather.mjs) based on the ingested data. - Sanitization: There is no mechanism in the script to validate or sanitize the code generated by the agent before it is written to the file system.
Audit Metadata