wiki-ingest
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from external URLs and local files without sanitization or boundary markers.
- Ingestion points: Untrusted data enters the agent context via user-provided file paths, external URLs (fetched via
browseskill), and pasted text as described in Step 1 ofSKILL.md. - Boundary markers: The instructions lack delimiters (e.g., XML tags or triple quotes) or 'ignore embedded instructions' warnings for the ingested content, explicitly mandating the agent 'Read all content... Do not skip' in Step 2.
- Capability inventory: The skill possesses extensive file system capabilities, including reading
SCHEMA.mdand all files inwiki/pages/, and writing/updating multiple files such aswiki/pages/<slug>.md,wiki/index.md,wiki/overview.md, andwiki/log.md. - Sanitization: No validation or filtering is performed on the ingested content before it is used to generate summaries and update entity pages.
- [DATA_EXFILTRATION]: The skill allows the agent to read any user-provided 'File path'.
- Evidence: Step 1 in
SKILL.mdinstructs the agent to 'read it directly' and 'copy to raw/' for any provided file path. This capability could be exploited to ingest sensitive local files (e.g., SSH keys, credentials, or configuration files) into the wiki structure or disclose them in the agent's summary output.
Audit Metadata