octopus-quick
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: In 'Step 5: Generate Summary', the provided bash script uses an unquoted heredoc (
<<EOF) to process the$TASK_DESCRIPTIONvariable. This pattern is vulnerable to command injection because the shell will execute any command substitutions (e.g.,$(...)) or variable expansions present in the user-supplied task description. - [PROMPT_INJECTION]: The skill creates an indirect prompt injection surface by interpolating untrusted user input into shell commands without sanitization:
- Ingestion points: User input is ingested via the task description in SKILL.md.
- Boundary markers: The bash script template lacks delimiters or escaping to isolate user data from the command structure.
- Capability inventory: The skill relies on
bash,git, and local scripts in the.claude-octopusdirectory for its primary functionality. - Sanitization: No validation or sanitization steps are defined for the task description before it is processed in the shell environment.
Audit Metadata