command-generator
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection and YAML structure manipulation because user-provided inputs are directly interpolated into templates without sanitization.\n
- Ingestion points: Parameters
descriptionandargumentHintprovided inSKILL.mdare processed throughPhase 1andPhase 4.\n - Boundary markers: Absent. The template in
templates/command-md.mddoes not use delimiters or instructions to isolate user-provided content from the command's logic.\n - Capability inventory:
Write,Edit, andBashtools allow the skill to create and modify command files that the agent will later interpret as executable instructions.\n - Sanitization: While
skillNameandgroupare validated with regex, thedescriptionandargumentHintfields are only checked for length. An attacker could inject YAML delimiters (---) or newlines to corrupt the frontmatter or inject malicious instructions into the generated file.\n- [COMMAND_EXECUTION]: The skill uses theBashtool for filesystem management tasks inphases/02-target-path-resolution.mdandphases/05-file-generation.md(e.g.,mkdir -p,test -f). Although the inputs for these commands are validated to prevent shell injection, using shell execution for simple directory and file checks is a higher-privilege approach than using standard filesystem APIs.
Audit Metadata