deeptools
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/workflow_generator.pyis vulnerable to shell command injection. It uses Python f-strings to interpolate user-provided arguments (such as--input-bamor--chip-bams) directly into a generated bash script template without any sanitization or escaping. If an attacker provides an input containing shell metacharacters like backticks,$(), or semicolons, these commands will be executed in the user's environment when the resulting workflow script is run. - [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection via the processing of untrusted external data.
- Ingestion points: The
scripts/validate_files.pyscript reads and parses the contents of user-provided BAM, BED, and bigWig files to validate their format. - Boundary markers: There are no boundary markers or instructions telling the agent to ignore embedded commands within the processed genomic data files.
- Capability inventory: The skill has the capability to generate and execute shell scripts through the
workflow_generator.pyscript and the instructions inSKILL.md. - Sanitization: No sanitization or validation is performed on the data extracted from external files before it is used in logic that influences agent actions or generated script content.
Audit Metadata