markdown-lint
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Shell injection vulnerability identified in the file processing automation.
- Evidence: In
SKILL.md, the commandbash scripts/check-horizontal-rules.sh $(find . -name '*.md' ...)and the subsequent loopfor file in $files; do ... donefail to use double quotes around subshell expansions and variable references. If a file in the repository is named with shell metacharacters (e.g.,; touch EXPLOIT ;.md), the shell will execute those characters as commands during expansion. - [COMMAND_EXECUTION]: Modification of file system permissions.
- Evidence: The skill instructs the agent to perform
chmod +xon thescripts/check-horizontal-rules.shfile. - [EXTERNAL_DOWNLOADS]: Fetching of external dependencies and tools.
- Evidence: The skill configuration downloads and installs
markdownlint-cli2vianpxand references the official markdownlint repositoryhttps://github.com/DavidAnson/markdownlint-cli2for pre-commit hooks. - [INDIRECT_PROMPT_INJECTION]: Vulnerability to indirect manipulation via untrusted repository content.
- Ingestion points: The skill processes all markdown (
.md) files found within the local repository usingfindandawk. - Boundary markers: None; the shell and awk scripts process file content directly without delimiters or instruction-ignore headers.
- Capability inventory: The skill has the ability to execute shell scripts (
bash), read files (awk), and overwrite files (mv). - Sanitization: None; the lack of quoting in shell commands represents a failure to sanitize input from the file system, leading to the command injection risk noted above.
Recommendations
- AI detected serious security threats
Audit Metadata