bridge-commons
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Implements a discovery protocol in
tool-discovery.mdthat executes local shell commands (which,cat,echo) and a short Python snippet (python3 -c) to detect the runtime environment and parse configuration files. - [PROMPT_INJECTION]: The
SKILL.mdfile defines prompt templates that interpolate untrusted variables such astask_descriptionandscopeinto instructions for sub-agents, creating a surface for indirect prompt injection. - Ingestion points: Untrusted data enters the agent context through the
bridge_inputschema defined inSKILL.md. - Boundary markers: The templates use structural headers (e.g.,
SCOPE:,TASK:) but do not include explicit instructions or delimiters to ignore adversarial commands embedded within the input data. - Capability inventory: Bridges have access to powerful tools including
Bash(for CLI execution),Write(for local logging), andTask(for spawning parallel sub-agents). - Sanitization: No input validation, escaping, or sanitization logic is specified for the interpolated fields.
- [DATA_EXFILTRATION]: Defines a protocol for writing audit artifacts and execution logs to the local
.outputs/bridges/directory. No network exfiltration or sensitive data exposure was detected.
Audit Metadata