moai-workflow-jit-docs
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill implements an automated system for discovering and loading documentation from external and local sources, creating an indirect prompt injection surface.
- Ingestion points: Data enters the agent's context through
WebFetch(external framework docs),WebSearch(community resources and tutorials), andRead(local project documentation in directories like.moai/docs/anddocs/). - Boundary markers: The skill instructions lack explicit boundary markers or directives to treat external documentation as untrusted data, which may allow embedded malicious instructions to override agent behavior.
- Capability inventory: The agent is authorized to use
Read,Grep, andGlobfor file system access, andWebFetchandWebSearchfor network operations. This provides the necessary tools for an attacker to execute complex payloads if injection is successful. - Sanitization: No sanitization, validation, or filtering of the fetched documentation content is specified in the skill's logic.
- [DATA_EXFILTRATION]: The skill configuration allows for both reading local project files and making outbound network requests to arbitrary domains. While the intended use is for documentation retrieval, this combination of capabilities represents a potential exfiltration path for sensitive project data if the agent's logic is subverted via malicious input from external sources.
Audit Metadata