status
Fail
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The bash implementation in
SKILL.mdis vulnerable to shell command injection. The variableloop_idis interpolated directly into a double-quoted string within ajqcommand. Because bash evaluates command substitutions inside double quotes, an attacker-controlled argument containing backticks or$()would execute arbitrary code in the host environment. - [COMMAND_EXECUTION]: The skill is susceptible to
jqfilter injection. The$loop_idvariable is used to construct ajqfilter string without proper escaping. A malicious payload can break out of the string literal (e.g., using") | ...) to execute unintendedjqoperations and potentially leak sensitive data from the loop registry. - [PROMPT_INJECTION]: The skill contains 'Self-Evolving' and 'Post-Execution Reflection' directives that instruct the AI to modify the
SKILL.mdfile itself based on runtime outcomes. This creates a significant risk of persistent instruction injection, where an attacker could influence the agent to rewrite its own source code, potentially introducing malicious behavior or bypassing safety constraints.
Recommendations
- AI detected serious security threats
Audit Metadata