mthds-inputs
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently executes the
mthds-agentCLI tool for version checking (mthds-agent --version), schema extraction (mthds-agent pipelex inputs bundle), and running pipelines (mthds-agent pipelex run bundle). It also uses shell commands likecpto manage file system operations within the workspace. - [EXTERNAL_DOWNLOADS]: The skill instructs users to install the
mthdspackage globally vianpm install -g mthds. It also references an external PDF file fromw3.orgas a fallback test document, which is a well-known and trusted source. Additionally, it suggests installing third-party Python libraries likepython-docxandopenpyxlif they are not already available. - [REMOTE_CODE_EXECUTION]: The skill uses dynamic execution by generating Python code snippets to create PDF, DOCX, and XLSX files. These snippets use libraries like
reportlab,python-docx, andopenpyxlto programmatically build documents based on the user's synthesis requirements. While this is the intended purpose for generating test data, it involves the agent generating and running executable code. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it processes user-provided file names and folder paths to populate
inputs.jsonand CLI arguments. - Ingestion points: User-provided file paths, folder paths, and file extensions used during the inventory and matching phases (SKILL.md).
- Boundary markers: None explicitly defined to isolate user-provided strings from the command logic or JSON structure.
- Capability inventory: The skill has the ability to write files via Python, execute shell commands (
cp), and invoke themthds-agentCLI (SKILL.md). - Sanitization: There is no explicit evidence of sanitization or validation for user-provided paths to prevent directory traversal or command injection via file names.
Audit Metadata