hackernews
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is highly susceptible to Indirect Prompt Injection. The
hn-deepdive.shscript fetches raw content from external URLs provided by the Hacker News API and interpolates it directly into a prompt for a sub-agent (pi). There are no boundary markers or instructions to the sub-agent to ignore embedded commands within the fetched content. - Ingestion points:
hn-deepdive.shusescurlto fetch article content from$ARTICLE_URLand story comments viahn-cli.sh. - Boundary markers: Absent. External content is concatenated directly into the instructions for the
pisub-agent. - Capability inventory: The skill can read/write local files (
~/Stuff/...), perform network operations viacurl, and execute subprocesses. - Sanitization: Absent. The skill instructions specifically tell the agent to 'Automatically run a second deep dive' if a link is found, creating a chain that could be exploited by an attacker.
- [COMMAND_EXECUTION]: The
hn-deepdive.shscript performs unsafe string construction for the sub-agent's tasks. It includes a shell command string (curl -sL '$ARTICLE_URL' | pandoc ...) inside the prompt sent to thepitool. If the sub-agent is configured to execute commands and the$ARTICLE_URLcontains shell metacharacters or escape sequences, it could lead to command injection within the sub-agent's environment. - [EXTERNAL_DOWNLOADS]: The skill makes extensive use of external APIs (Hacker News Firebase API and Algolia Search API) and fetches content from arbitrary websites during the 'deep-dive' process. While these are core to its functionality, the lack of sanitization on the fetched data presents a risk.
Audit Metadata