competitor-teardown
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Utilizes the vendor-specific
beltCLI for market research and browser automation. It also usesnpxto install additional skills from the author's own repository. - [EXTERNAL_DOWNLOADS]: Links to installation instructions for the
beltCLI hosted on the author's official GitHub repository. - [REMOTE_CODE_EXECUTION]: Employs a static Python script for generating competitive positioning maps. The script is executed via a specialized vendor tool and uses the standard
matplotliblibrary. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection attack surface due to its data ingestion capabilities.
- Ingestion points: Retrieves content from the live web via
tavily/search-assistant,exa/search, andinfsh/agent-browser(SKILL.md). - Boundary markers: The instructions lack delimiters or constraints to prevent the agent from following malicious instructions found within the retrieved web data.
- Capability inventory: The skill allows the agent to execute code via
infsh/python-executorand perform image processing viainfsh/stitch-images(SKILL.md). - Sanitization: No sanitization or filtering mechanisms are specified for the untrusted external content before it is processed by the agent.
Audit Metadata