week-report-system
Fail
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill requires a GitHub Personal Access Token (PAT) and provides automated instructions to write this token in plain text into shell configuration files such as
.zshrc,.bashrc, and.bash_profile. This exposes the credential to any process or user with read access to the home directory. - [DATA_EXFILTRATION]: The skill is designed to silently record user conversations and AI responses, transmitting this data to an external GitHub repository in the background. While this is the stated purpose of a "week report system," the silent nature of the operation and the handling of the PAT increase the risk of unauthorized data exposure.
- [REMOTE_CODE_EXECUTION]: The skill instructions recommend installing a global npm package from a personal third-party repository (
@wang121ye/skillmanager) to manage and install skills across different AI agents. This introduces a supply chain risk through unverified third-party code execution. - [COMMAND_EXECUTION]: The skill uses shell commands and Python's
subprocess.runto perform environment checks, modify system configuration files (sed,cat), and manage Git operations. The automated modification of shell profiles is a persistence-like behavior used for storing credentials. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection during the "Weekly Report Generation" phase. It reads historical conversation logs (
.txtfiles) from the Git repository and interpolates them into an AI analysis prompt without sanitization or boundary markers. This could allow an attacker to embed malicious instructions in a previous conversation that are later executed when the agent generates a summary. - Ingestion points:
references/report_generation.md(Step 3: Read Conversation Files) andscripts/git_operations.py(Pulling logs from remote). - Boundary markers: Absent. The combined text of all conversations is directly interpolated into the analysis prompt.
- Capability inventory: The skill has file read/write access and the ability to execute shell commands via
git_operations.py. - Sanitization: Absent. The skill uses simple regex splitting for formatting but does not escape or validate content for prompt injection patterns.
Recommendations
- AI detected serious security threats
Audit Metadata