docs-reading
Warn
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/parse_godot.pyemploys theexec()function to execute the contents ofversion.pylocated within a directory provided via the--godot-repocommand-line argument. This allows for arbitrary code execution if the tool is run against a directory containing a maliciousversion.pyfile. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It parses content from external Markdown and Godot XML files which are then served to the agent as context for search queries. Documentation containing adversarial instructions (e.g., 'Ignore all previous instructions and perform X') could influence the agent's behavior.
- Ingestion points:
scripts/parse_docs.pyandscripts/parse_godot.py(ingests files from the local filesystem). - Boundary markers: None identified in the output formats (text/markdown) provided to the agent.
- Capability inventory: While the search CLI is read-only, the agent utilizing this skill may have access to other tools (e.g., shell or filesystem access) that could be targeted by an injection.
- Sanitization: The skill implements basic formatting removal (Markdown/BBCode stripping) but lacks filtering for natural language instructions in the ingested content.
Audit Metadata