landing-page-factory-orchestrator
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/run-pipeline.pyandscripts/page-admin.pyutilizesubprocess.runto execute other Python and Bash scripts within theskills/directory (e.g.,site-extract,page-build). This is a functional requirement for the factory's modular architecture and uses argument lists to minimize injection risk. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface (Category 8) by processing untrusted data from external URLs that propagate to downstream LLM-driven tasks. (1) Ingestion points: The
--urlargument inscripts/run-pipeline.pyallows external content into the pipeline. (2) Boundary markers: No explicit delimiters or instructions are used to isolate extracted content from the agent's internal logic. (3) Capability inventory: The skill can execute local scripts viasubprocess.runand write artifacts to theworkspace/andmemory/directories. (4) Sanitization: Brand, audience, and angle inputs are sanitized using aslugifyfunction, and URLs are validated viaurlparse.
Audit Metadata