explore-run
Warn
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/write_outputs.pyusesimportlib.utilto dynamically load and execute a Python module from a path calculated at runtime (../../../shared/scripts/write_explore_bundle.py). This technique allows for the execution of shared code that resides outside the skill's file structure. \n- [INDIRECT_PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing potentially untrusted research configurations. \n - Ingestion points: The
scripts/plan_variants.pyscript reads experiment specifications from a JSON file provided via the--spec-jsonargument. \n - Boundary markers: There are no boundary markers or clear instructions provided to the agent to distinguish between configuration data and potentially malicious instructions. \n
- Capability inventory: According to the
SKILL.mdfile, the skill is intended to hand off task execution to high-capability tools such asminimal-run-and-auditandrun-train, which can execute arbitrary shell commands. \n - Sanitization: The
scripts/plan_variants.pyscript extracts fields likebase_commandfrom the input JSON and includes them in the execution plan without any sanitization or validation logic.
Audit Metadata