byted-ark-evolve
Pass
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it ingests and processes untrusted historical conversation data to update the agent's core instructions. An attacker could potentially use specific chat history to influence the agent's future rules, although this is mitigated by mandatory human review of all proposals.
- Ingestion points:
scripts/scan-history.py(reads conversation JSONL files) andscripts/detect-signal.py(processes hook input). - Boundary markers: Absent in the analysis worker prompt within
orchestrator.py. - Capability inventory:
apply-proposal.py(writes to.mdfiles in workspace) andorchestrator.py(executes platform CLI commands). - Sanitization: Employs regex pattern matching for initial signal detection, though the final synthesis of rules is performed by an LLM-based worker.
- [COMMAND_EXECUTION]: Several scripts utilize the
subprocessmodule to interface with system tools likegitand theopenclawplatform CLI. - Evidence:
scripts/orchestrator.pyinvokesopenclaw agent --local,scripts/apply-proposal.pyuses variousgitcommands, andscripts/workspace-init.pycallsopenclaw --version. All observed calls use list-based arguments without shell execution, minimizing command injection risk.
Audit Metadata