blogwatcher
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill installs the
blogwatcherCLI tool via a Go module from an unverified GitHub repository (github.com/Hyaxia/blogwatcher).- [COMMAND_EXECUTION]: The skill executes theblogwatcherbinary to perform tasks like adding blogs, listing articles, and scanning for updates.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the ingestion of external RSS/Atom feed content. - Ingestion points: Untrusted data enters the agent context through the
blogwatcher scanandblogwatcher articlescommands as defined inSKILL.md. - Boundary markers: No explicit delimiters or instructions are provided to the agent to treat external feed content as untrusted data.
- Capability inventory: The agent is configured to execute the
blogwatcherCLI and process its outputs, which contains the external data. - Sanitization: There is no evidence of filtering or sanitization of the feed content before it is presented to the agent.
Audit Metadata