wiki-builder
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: Arbitrary file read capability through CLI tool.
- Evidence: The
pagecommand inscripts/wiki-cli.jsutilizesfs.readFileSyncon a path supplied via the--from-fileargument. This allows the agent to read any file on the host system accessible to the user, potentially exposing sensitive files like~/.ssh/id_rsaor.envif the agent is manipulated via prompt injection. - [PROMPT_INJECTION]: Vulnerability to indirect prompt injection during source ingestion.
- Ingestion points: The skill processes untrusted external content stored in the
raw/directory using templates liketemplates/prompts/compile-source-page.md. - Boundary markers: The prompts lack delimiters or explicit instructions to the model to ignore embedded commands within the source material.
- Capability inventory: The skill can write files to the local file system and update a SQLite search index via
scripts/wiki-cli.js. - Sanitization: No sanitization or validation is performed on the ingested source content before it is interpolated into prompts for the agent.
- [COMMAND_EXECUTION]: Susceptibility to sed script injection during wiki initialization.
- Evidence: In
scripts/init_wiki.sh, therenderfunction usessedwith a|delimiter to replace placeholders:sed -e "s|{{TITLE}}|$title|g". Since the$titlevariable is expanded directly within thesedcommand string, a title containing|could be used to inject additionalsedcommands, potentially altering the generated wiki configuration or templates.
Audit Metadata