execute-task-direct
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes several local shell commands, including
git pulland multiple subcommands of theagkanCLI tool (task list, task block list, task update) to manage development workflows. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It retrieves external data (task titles and bodies) from the
agkantool and interpolates this content directly into the prompt of a sub-agent without sanitization. - Ingestion points: Task content is ingested from the
agkan task listoutput (specifically theid,title, andbodyfields). - Boundary markers: The prompt uses basic Markdown headers (
## Task Information) and list markers (- Body: <body>), which may not be sufficient to prevent an attacker from breaking out of the instruction context if the task body contains adversarial content. - Capability inventory: The sub-agent triggered via the
Tasktool is granted the capability to implement code changes directly in the local environment. - Sanitization: There is no evidence of sanitization, escaping, or validation of the task content before it is passed to the sub-agent.
Audit Metadata