config-reader
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The execution logic in
SKILL.mduses a shell command template (bash {baseDir}/scripts/config_reader.sh FIELD DEFAULT) whereFIELDandDEFAULTare meant to be replaced by the agent. This manual substitution pattern is prone to command injection if the agent provides unsanitized input for these placeholders.- [PROMPT_INJECTION]: The skill reads from.agents.ymland.agents.local.yml, providing their contents to the agent. This represents an indirect prompt injection surface where malicious configuration data could be used to override agent instructions. - Ingestion points: Data is read from project configuration files in
scripts/config_reader.sh. - Boundary markers: None used; the extracted values are returned directly.
- Capability inventory: The skill uses
yqto read files; the output is returned to the agent. - Sanitization: No sanitization or validation of the configuration content is implemented.
Audit Metadata