new-skill
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions direct the agent to execute a local shell script
scripts/scaffold.sh. This script performs standard file system operations (creating directories and writing files) and executes a local Python scriptscripts/audit_skills.py. These actions are performed entirely within the local repository context and align with the skill's stated purpose as a developer tool. - [INDIRECT_PROMPT_INJECTION]: The
scaffold.shscript facilitates an indirect prompt injection surface. It accepts a user-provided description and interpolates it directly into theSKILL.mdfile usingsedwithout sanitization or boundary markers. A malicious user could provide a description containing prompt injection instructions that would then be embedded into the newly created skill. However, this affects only the output file and does not compromise the current execution environment. - Ingestion points: User-supplied
<one-line description>argument inscaffold.sh. - Boundary markers: None. Input is placed directly into the
descriptionfield of the YAML frontmatter. - Capability inventory: File system writes (mkdir, sed) and local script execution (python3 scripts/audit_skills.py).
- Sanitization: None. The script uses
sedwith a|delimiter, which may fail if the description contains that character but does not provide input sanitization against LLM instruction injection.
Audit Metadata