ljg-qa
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands to interact with the local system for operational tasks.
- Evidence: Execution of
curl -s -X POST http://localhost:31337/notifyto send progress notifications to a local endpoint. - Evidence: Use of
date +%Y%m%dT%H%M%Sto generate timestamps for file naming conventions. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) due to the combination of untrusted data ingestion and available system capabilities.
- Ingestion points: The skill fetches external content via
WebFetch(URLs) and reads local files viaRead(PDFs) as defined inWorkflows/Extract.md. - Boundary markers: Absent. There are no instructions or delimiters provided to the agent to distinguish between the source text and instructions, or to ignore potential commands embedded in the documents.
- Capability inventory: The agent has the ability to execute shell commands (
curl,date) and write files to~/Documents/notes/. - Sanitization: Absent. Content from fetched URLs or documents is processed directly without filtering or validation of its instructions.
Audit Metadata