reflex-scripting
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill grants the agent the ability to execute a wide range of shell-level commands through the
reflexutility. - Evidence: The instructions explicitly guide the agent to use commands like
reflex xlsx,reflex rest, andreflex csvto perform direct library operations. - [REMOTE_CODE_EXECUTION]: The skill allows for the execution of arbitrary code strings generated or provided at runtime via script interpreters.
- Evidence: The skill defines the
reflex lua execandreflex python execcommands specifically for running complex, dynamically generated logic. - [DATA_EXFILTRATION]: The skill provides both file system access and network capabilities, creating a direct path for data exfiltration.
- Evidence: The agent can use libraries like
XlsxorCsvto read local data and theRestlibrary to send that data to external URLs via HTTP requests. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it is designed to ingest and process data from untrusted external sources.
- Ingestion points: Data enters the agent's context through file reads (
reflex xlsx open,reflex csv) and API responses (reflex rest get). - Boundary markers: The skill does not provide instructions for using delimiters or markers to differentiate between trusted instructions and untrusted data content.
- Capability inventory: The skill provides arbitrary script execution (
lua exec,python exec), file system modification (Fl.write), and network requests (rest). - Sanitization: There are no requirements or mechanisms described for sanitizing or validating data retrieved from external files or APIs before processing it.
Audit Metadata