ship-skill
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to run local scripts (
quick_validate.py,eval_workspace.py,token_budget.py,package_skill.py) and theskills-refCLI tool to automate a shipping pipeline. - [PROMPT_INJECTION]: The skill processes external skill files, creating an attack surface for indirect prompt injection where malicious instructions in the target skill could influence the agent's behavior.
- Ingestion points: Untrusted data enters the context when the agent reads files from the path specified in
$ARGUMENTS(SKILL.md). - Boundary markers: No specific delimiters or 'ignore' instructions are used to isolate the data being validated.
- Capability inventory: The agent utilizes
Bash,Read, andWritetools across the pipeline (SKILL.md). - Sanitization: No sanitization or validation of the ingested content is performed before the agent processes it.
Audit Metadata