minimal-run-and-audit
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_command.pyusessubprocess.runto execute arbitrary commands provided via the--commandCLI argument. While it utilizesshlex.splitto avoid simple shell injection, it effectively serves as a wrapper for arbitrary command execution on the host system. - [DYNAMIC_EXECUTION]: The script
scripts/write_outputs.pyusesimportlibto dynamically load and execute a module from a path computed at runtime (../../../shared/scripts/write_run_bundle.py). Loading executable code from outside the skill's own package boundaries using relative paths increases the risk of executing untrusted code if the surrounding filesystem environment is not strictly controlled. - [INDIRECT_PROMPT_INJECTION]: The skill ingests untrusted data from the output of executed commands, creating a potential attack surface. 1. Ingestion points: The
stdoutandstderrstreams of the executed commands are captured and logged inscripts/run_command.py. 2. Boundary markers: None are present to delimit untrusted output from instructions. 3. Capability inventory: The skill possesses the capability to run arbitrary subprocesses and perform git operations. 4. Sanitization: No sanitization or filtering of the captured output is performed before it is processed or logged.
Audit Metadata