improvement-generator
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/propose.pyexecutes theclaudeCLI tool using thesubprocess.runfunction. While the execution uses a fixed list of arguments and passes variable input safely through standard input (stdin) rather than shell arguments, the reliance on external binaries for core logic is a notable behavior.- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection. It ingests content from external sources, including target skill files (SKILL.md) and failure traces, which are then interpolated into an LLM prompt to generate improvement candidates. Maliciously crafted instructions within these ingested files could potentially influence the LLM's output, leading to the generation of harmful execution plans.- [PROMPT_INJECTION]: The following evidence chain supports the indirect prompt injection finding: (1) Ingestion points: The skill reads contents fromSKILL.mdand JSON files provided via--traceand--sourcearguments. (2) Boundary markers: The prompt construction inscripts/propose.pyuses basic Markdown headers to separate user-controlled data from system instructions, which may be insufficient to prevent sophisticated injection attacks. (3) Capability inventory: The skill generates JSON artifacts containing anexecution_planthat defines filesystem operations (likeappend_markdown_section) to be performed by other tools. (4) Sanitization: There is no evidence of content validation or escaping of the ingested data before it is sent to the LLM, nor verification of the LLM's output before it is written to the candidate JSON artifact.
Audit Metadata