build-engineer
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): Vulnerable to indirect prompt injection via the processing of project requirements.
- Ingestion Points: CLI arguments (port, framework, language, api_proxy) in
scripts/config_vite.pyandscripts/config_webpack.pyare used to populate configuration templates. - Boundary Markers: None. Untrusted input is directly interpolated into template strings.
- Capability Inventory: The scripts write
.jsand.tsfiles to the filesystem, which are executed as part of the software build process. - Sanitization: Absent. There is no escaping or validation of input before it is written to executable files.
- [COMMAND_EXECUTION] (HIGH): The skill can be tricked into generating malicious build configurations.
- Evidence: In
scripts/config_vite.py, theapi_proxyparameter is placed inside a string literal in the generatedvite.config.ts. A crafted payload could use quote-breaking (e.g.,', onProxyReq: () => { ... }, ') to inject arbitrary JavaScript logic into the build server. - [LOW] (INFO): Code quality issue in
scripts/config_webpack.py. - Evidence: Line 25 contains an f-string
{ BundleAnalyzerPlugin }which refers to an undefined Python variable, causing the script to crash with aNameErrorrather than generating a valid config.
Recommendations
- AI detected serious security threats
Audit Metadata