test-case-reviewer-en
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes data from various external file formats including Word (.docx), Excel (.xlsx), and CSV. This content is intended to be used within AI prompts, creating a surface for indirect prompt injection. A malicious file could contain instructions designed to hijack the agent's persona or extract information. Ingestion points: Content is read from external files via
scripts/convert_formats.pyandscripts/parse_formats.py. Boundary markers: System prompts inprompts/test-case-reviewer_EN.mddo not use delimiters or instructions to ignore embedded commands. Capability inventory: The skill can write files to theartifacts/directory and execute local commands viasubprocess.call. Sanitization: Extracted content is not validated or sanitized before prompt construction. - [COMMAND_EXECUTION]: Internal scripts utilize
subprocess.callto chain conversion and parsing tasks. While the implementation uses list-based arguments to mitigate shell injection, the skill relies on the ability to spawn local processes to perform its core conversion and template-batching functions.
Audit Metadata