knowledge-explorer
Warn
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
update-appendcommand utilizestyper.edit()to open a system editor. The documentation explicitly notes that theEDITORorVISUALenvironment variables can be set to scripts for programmatic interaction. This capability allows for arbitrary command execution if an agent or attacker can influence the environment variables used during the script's execution. - [COMMAND_EXECUTION]: The commands
fetch-github <owner/repo>andset-description <topic> "<description>"accept arbitrary strings as input. If the underlying Python script (research/knowledge-explorer.py) processes these inputs using shell execution (e.g.,os.systemorsubprocess.run(..., shell=True)), it may be vulnerable to command injection attacks. - [EXTERNAL_DOWNLOADS]: The
fetch-githubcommand fetches data (READMEs, metadata, and directory listings) from GitHub repositories. While GitHub is a trusted platform, the content fetched is user-generated and untrusted. This creates a surface for indirect prompt injection where malicious instructions in a README could influence the agent's behavior during theaddorset-descriptionphases of the workflow. - [DATA_EXFILTRATION]: The skill relies on an authenticated GitHub CLI (
gh) session. This grants the script access to the user's GitHub tokens and private repository data. Unvalidated input passed togh apicalls via thefetch-githubcommand could be used to attempt unauthorized data access or exfiltration of sensitive repository information.
Audit Metadata