archon
Pass
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection in
SKILL.mdvia the!syntax to executearchon workflow listat load time, providing the agent with a live list of available workflows. Furthermore, the skill's primary function is to define and execute workflows that can contain 'Bash nodes' for arbitrary shell command execution. - [EXTERNAL_DOWNLOADS]: The
guides/setup.mdandguides/github.mdfiles provide instructions for installing external dependencies including Bun, Git, and ngrok. These downloads are directed to official and well-known service domains such asbun.sh. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it is designed to ingest and act upon data from external sources like GitHub issues and pull requests.
- Ingestion points: Workflow templates (e.g.,
examples/dag-workflow.yaml) use nodes that fetch content from GitHub issues and PRs. - Boundary markers: The prompt templates for nodes that process this content (e.g., the
classifynode) do not implement delimiters or explicit instructions to ignore embedded commands within the external data. - Capability inventory: The skill allows for full shell execution via Bash nodes, file system modifications, and the ability to trigger further AI agent actions with tool access.
- Sanitization: There is no evidence of sanitization or filtering of the retrieved external content before it is interpolated into AI prompts.
- [CREDENTIALS_UNSAFE]: Although the skill provides a secure, separate terminal setup wizard (
archon setup --spawn), the manual configuration guide inguides/github.mdsuggests an option where users can paste GitHub tokens directly into the chat interface. This practice exposes sensitive credentials to the model provider.
Audit Metadata