skill-system-insight
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
scripts/evolve-soul.mdcontains a PostgreSQL connection string in a psql command template that includes a hardcoded password (36795379). - [REMOTE_CODE_EXECUTION]: The scripts
scripts/evolution_proposal.pyandscripts/insight_bundle_b012.pyutilizeimportlib.utilto dynamically load and execute internal Python modules (mem.pyandevolution_arena.py) from relative file system paths calculated at runtime. - [COMMAND_EXECUTION]: The
route_issue_draftoperation inscripts/insight_bundle_b012.pygenerates shell command strings for the GitHub CLI (gh issue create). While intended for drafting rather than immediate execution, this capability involves the construction of shell commands from processed finding data. - [PROMPT_INJECTION]: The skill's 'OBSERVE' pipeline processes untrusted session transcripts to extract behavioral signals, creating an indirect prompt injection surface. Ingestion points: Session transcripts are read in
scripts/extract-facets.md. Boundary markers: The extraction procedure does not define delimiters or specific instructions to ignore embedded commands within the transcript. Capability inventory: The skill possesses the ability to perform database writes (db.write) and modify local filesystem artifacts including soul profiles and workflow recipes (fs.write). Sanitization: No explicit sanitization or validation logic is applied to the transcript content before it is processed by the LLM.
Recommendations
- AI detected serious security threats
Audit Metadata