tilt
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The documentation in
TILTFILE_API.mdandSKILL.mdprovides patterns for executing arbitrary shell commands via thelocal_resourcecmdandserve_cmdarguments, as well as thelocal()Starlark function. This allows the skill to run any command on the user's host machine. - REMOTE_CODE_EXECUTION (HIGH): The skill supports the
load('ext://...')mechanism andv1alpha1.extension_repofor fetching and executing extensions from external GitHub repositories. Since these sources are not in the analyzer's trusted list, this represents an unverified remote code execution vector. - PROMPT_INJECTION (HIGH): The skill is highly vulnerable to indirect prompt injection. 1. Ingestion points: The agent reads data from
tilt logsandtilt get uiresources(referenced inSKILL.mdandCLI_REFERENCE.md). 2. Boundary markers: No delimiters or ignore instructions are used when processing log/resource content. 3. Capability inventory: The agent can trigger resource updates, start/stop environments, and execute arbitrary commands. 4. Sanitization: No escaping or filtering of log/status content is performed before the agent processes it.
Recommendations
- AI detected serious security threats
Audit Metadata