run-batch-codex-research
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from a user-provided
inputs.txtfile and interpolates it into a prompt template without using boundary markers or content sanitization. Malicious instructions within the input list could potentially hijack the behavior of the underlying LLM CLI. - Ingestion points: The
inputs.txtfile is processed byscripts/render-prompts.shto generate per-input prompt files. - Boundary markers: The skill does not enforce or recommend the use of delimiters (e.g., XML tags or specific markers) around the interpolated user data in
template.mdto distinguish it from system instructions. - Capability inventory: The resulting prompts are executed via
codex execinscripts/run-batch.sh. This tool has the capability to execute shell commands and modify the filesystem. - Sanitization: While the skill correctly sanitizes filenames and shell variables, the text content substituted into the prompts remains unvalidated.
- [COMMAND_EXECUTION]: The skill's runner script (
scripts/run-batch.sh) is designed to execute thecodexCLI using the--dangerously-bypass-approvals-and-sandboxand--skip-git-repo-checkflags. Although these flags are documented as necessary for non-interactive parallel processing, they remove critical security boundaries, which increases the potential impact of a successful prompt injection attack.
Audit Metadata