post-session
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The troubleshooting section in
SKILL.mdexplicitly instructs the user or agent to runecho $GH_TOKEN. This practice leads to the exposure of sensitive authentication tokens in terminal logs or command history. - [COMMAND_EXECUTION]: The conversion phase in
SKILL.mduses shell interpolation of the$CAST_FILEand$TXT_FILEvariables within a Bash heredoc. While quoted, if the platform or tool environment does not properly sanitize filenames originating from the file discovery phase (which usesfind), this could potentially lead to command injection if a filename contains shell metacharacters. - [PROMPT_INJECTION]: The 'Self-Evolving Skill' section provides meta-instructions that command the agent to 'fix this file immediately' upon encountering issues. This creates a self-modification loop where the agent is encouraged to rewrite its own source code (
SKILL.md). In an adversarial context, this could be used to persist malicious instructions received via indirect prompt injection. - [PROMPT_INJECTION]: The skill processes untrusted external data (terminal recordings in
.castformat) and passes the converted text to an AI summarization step. - Ingestion points: Terminal recording files (
.cast) and their text conversions (.txt) processed inSKILL.md. - Boundary markers: None identified. The skill does not use delimiters or instructions to ignore embedded commands within the recording content.
- Capability inventory: The skill has access to
Bash(shell execution),Write(file modification), and the ability to update its ownSKILL.mdfile. - Sanitization: No evidence of sanitization or filtering of the recording content before it is processed by the AI for summarization.
Audit Metadata