project-name-generator
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Vulnerable use of
child_process.execincheck-domains.jsallows for arbitrary command execution. The script constructs a shell command using string interpolation:whois ${domain}. Thedomainvariable incorporates data generated by the AI agent based on user input without any sanitization or escaping of shell metacharacters. If the AI is manipulated into generating a name containing characters like;,&, or|, those commands will be executed by the host shell. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection.
- Ingestion points: Project descriptions provided by the user are processed in
SKILL.md. - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands within the user's project description.
- Capability inventory: The skill utilizes
child_process.execwithincheck-domains.jsto run system commands. - Sanitization: Absent. The script does not validate or sanitize the input strings before passing them to the shell execution function.
Recommendations
- AI detected serious security threats
Audit Metadata