agkan-run-direct
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple shell commands using
git,gh(GitHub CLI), andagkan. These include fetching branch information, pulling code, and updating task statuses. These operations are appropriate for the skill's intended use as a development automation tool. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8). It ingests untrusted data from an external source (the
agkantask tracker) and interpolates it into a prompt for a sub-agent. - Ingestion points: Task titles, bodies, and metadata retrieved via
agkan task listandagkan task getin Step 6. - Boundary markers: The skill uses basic Markdown headers (e.g.,
## Task Information) to separate data from instructions. These delimiters are weak and can be easily bypassed by adversarial content within a task's body. - Capability inventory: The sub-agent (triggered via the
Tasktool) is given broad instructions to 'Implement task' and 'follow its procedures to implement', which typically involves file system modifications and further command executions. - Sanitization: There is no evidence of sanitization, escaping, or validation of the task content before it is placed into the
promptargument of the sub-agent call.
Audit Metadata