wikipedia-research
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes a Python script using the environment variable
WIKIPEDIA_MCP_SCRIPT. This is a standard pattern for MCP (Model Context Protocol) integrations and is considered intended behavior for this skill type. - [PROMPT_INJECTION]: The skill processes data from Wikipedia, which is an untrusted, publicly editable source. This creates an indirect prompt injection surface where malicious instructions placed on a Wikipedia page could theoretically influence the agent's behavior during the research process.
- Ingestion points: Page content and summaries are retrieved via the
get_contentandget_summarytools inSKILL.md. - Boundary markers: The instructions do not define explicit boundary markers or delimiters for the fetched Wikipedia content.
- Capability inventory: The skill uses
python3to execute commands via the$MCP_CALLutility. - Sanitization: No evidence of input/output sanitization or instruction-filtering is provided in the skill definition.
Audit Metadata