arxiv-watcher

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/search_arxiv.sh interpolates the $QUERY variable directly into a curl command string. If an agent passes a query containing shell metacharacters such as backticks or $(...), it could lead to arbitrary command execution on the host machine.
  • [PROMPT_INJECTION]: The skill processes untrusted external data (ArXiv paper titles and abstracts), which serves as a surface for indirect prompt injection attacks. \n
  • Ingestion points: XML data fetched from export.arxiv.org. \n
  • Boundary markers: None; the skill is instructed to parse and summarize the content directly without delimiting markers or safety instructions. \n
  • Capability inventory: The skill can execute local shell scripts, write to memory/RESEARCH_LOG.md, and fetch arbitrary web content via web_fetch. \n
  • Sanitization: There is no evidence of input validation or content sanitization to prevent malicious instructions within paper abstracts from affecting the agent behavior.
  • [EXTERNAL_DOWNLOADS]: The skill makes network requests to export.arxiv.org to retrieve paper data. This is an official and well-known academic repository.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 04:45 PM