quadrants
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/quadrants-cli.shis vulnerable to command injection through shell variable expansion. Parameters such asTASK_ID,PROJECT_ID, andTASKS_JSONare interpolated directly into double-quoted strings within the script. If these variables contain shell metacharacters like$(...)or backticks, the shell will evaluate and execute them. Evidence: Inscripts/quadrants-cli.sh, the linecall_api "{\"action\":\"complete\",\"taskId\":$TASK_ID}"and thebulk-createaction allow for arbitrary command execution if the agent is tricked into providing malicious input.\n- [PROMPT_INJECTION]: The skill retrieves and processes untrusted task descriptions and project data from an external API, creating a surface for indirect prompt injection. Ingestion points: Data fromhttps://quadrants.chis fetched by thetasks,projects, andoverviewactions. Boundary markers: The skill does not implement delimiters or instructions to treat the external data as untrusted. Capability inventory: The agent can execute shell commands and perform network operations using the provided CLI script. Sanitization: No sanitization is performed on the data retrieved from the remote API before it is presented to the agent.
Audit Metadata