inspect-package
Warn
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the "$ARGUMENTS" variable directly within a bash shell command in
SKILL.md. This pattern allows for command injection if the input provided to the skill contains shell metacharacters such as backticks, semicolons, or subshell syntax, potentially leading to arbitrary code execution on the host. - [PROMPT_INJECTION]: The skill implements a workflow that reads and displays the contents of a
manifest.jsonfile from untrusted ZIP packages, creating an indirect prompt injection surface. - Ingestion points: The Python script within
SKILL.mdreads the content ofmanifest.jsonfrom the user-provided package file. - Boundary markers: Absent; the content is printed directly to the agent's context without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill is configured with access to the
Bashtool, which could be abused if the agent executes instructions found within the manifest. - Sanitization: Absent; the script parses the JSON and prints it to the console without any filtering or escaping of potentially malicious instructions.
Audit Metadata