test
Warn
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill uses the
$ARGUMENTSvariable (issue number) to construct file paths such astmp/issues/<issue番号>/checklist.md. This pattern is vulnerable to path traversal attacks; a malicious user could provide an input like../../etc/passwdto attempt to read sensitive system files. - [COMMAND_EXECUTION]: The skill utilizes tools like
WriteandEditto create or modify files in directories derived from user input. This allows for potential unauthorized file manipulation if path traversal sequences are used to target sensitive locations outside the intended temporary directory. - [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface. (1) Ingestion points: Data is read from
config.jsonandtmp/issues/<issue番号>/checklist.md. (2) Boundary markers: No delimiters or specific instructions are provided to the agent to ignore potentially malicious instructions within these files. (3) Capability inventory: The skill has access toBash,Read,Write, andEdittools. (4) Sanitization: No validation or sanitization is performed on the user-provided issue number or the contents of the checklists.
Audit Metadata