skill-creator
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
subprocessmodule to execute external commands and internal scripts. Specifically,scripts/run_eval.pyandscripts/improve_description.pyexecute theclaudecommand-line interface viasubprocess.Popenandsubprocess.run.run_eval.pypasses user-defined queries from anevals.jsonfile directly as arguments toclaude -p. While the queries are passed as list arguments (reducing direct shell injection risk), they result in the execution of the LLM against untrusted strings within a high-privilege CLI environment. - [INDIRECT_PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). It ingests untrusted data from multiple sources: test queries defined in
evals/evals.json, user intent captured during the 'Capture Intent' phase, and user feedback stored infeedback.json. - Ingestion points:
evals/evals.json(eval prompts),feedback.json(review comments). - Boundary markers: Absent; untrusted content is interpolated directly into prompts for subagents or the description optimizer.
- Capability inventory: The skill can execute the
claudeCLI, which has access to the user's filesystem and tools, and can write new.skillfiles viascripts/package_skill.py. - Sanitization: No explicit sanitization or instruction-filtering is performed on the ingested queries or feedback before they are processed by the LLM.
- [PROMPT_INJECTION]: The
SKILL.mdinstructions contain directives that attempt to influence the agent's default triggering behavior. Specifically, it instructs the agent to 'make the skill descriptions a little bit pushy' and to explicitly tell the model to 'Use this skill whenever...' to combat 'undertriggering'. This is a form of instruction override aimed at the system's skill-selection logic. - [EXTERNAL_DOWNLOADS]: The
eval-viewer/generate_review.pyscript launches a local HTTP server using Python'sHTTPServermodule on127.0.0.1. While limited to the local interface, this server provides access to files within the workspace directory, including scripts and generated outputs.
Audit Metadata