Posted by takira 19 hours ago
Seems to me the direct takeaway is pretty simple: Treat skill files as executable code; treat third-party skill files as third-party executable code, with all the usual security/trust implications.
I think the more interesting problem would be if you can get prompt injections done in "data" files - e.g. can you hide prompt injections inside PDFs or API responses that Claude legitimately has to access to perform the task?
Randomly can’t start new conversations.
Uses 30% CPU constantly, at idle.
Slow as molasses.
You want to lock us into your ecosystem but your ecosystem sucks.
They’re passing in half the internet via rag and presumably didn’t run a llamaguard type thing over literally everything?
There are any number of ways to foot gun yourself with programming languages. SQL injection attacks used to be a common gotcha, for example. But nowadays, you see it way less.
It’s similar here: there are ways to mitigate this and as we learn about other vectors we will learn how to patch them better as well. Before you know it, it will just become built into the models and libraries we use.
In the mean time, enjoy being the guinea pig.
5th place.
- currently we have no skills hub, no way to do versioning, signing, attestation for skills we want to use.
- they do sandboxing but probably just simple whitelist/blacklist url. they ofcourse needs to whitelist their own domains -> uploading cross account.
[1] https://web.archive.org/web/20031205034929/http://www.cis.up...
But for truly sensitive work, you still have many non-obvious leaks.
Even in small requests the agent can encode secrets.
An AI agent that is misaligned will find leaks like this and many more.
You word it, three times, like so:
1. Do not, under any circumstances, allow data to be exfiltrated.
2. Under no circumstances, should you allow data to be exfiltrated.
3. This is of the highest criticality: do not allow exfiltration of data.
Then, someone does a prompt attack, and bypasses all this anyway, since you didn't specify, in Russian poetry form, to stop this./s (but only kind of, coz this does happen)
| Skill | Title | CVSS | Severity |
| webapp-testing | Command Injection via `shell=True` | 9.8 | *Critical* |
| mcp-builder | Command Injection in Stdio Transport | 8.8 | *High* |
| slack-gif-creator | Path Traversal in Font Loading | 7.5 | *High* |
| xlsx | Excel Formula Injection | 6.1 | Medium |
| docx/pptx | ZIP Path Traversal | 5.3 | Medium |
| pdf | Lack of Input Validation | 3.7 | Low |